Hi [[ session.user.profile.firstName ]]

The Insider’s Motive: Defending Against the 7 Most Common Insider Threats

Insiders have something outside threat actors never will: trust. They’ve surpassed the challenge of external security defenses and can navigate sensitive internal resources with breakneck speed.

Today, 60% of attacks are carried out by insiders (IBM Cyber Security Intelligence Index), and the average cost of this type of breach is $8.76m (Ponemon Institute).

Unfortunately, many teams aren’t equipped to act quickly to detect and stop these incidents before it’s too late.

In this webinar, we will explore the top motives of insider threats and outline how organizations can determine the right countermeasures to stop both accidental and malicious insider threats in their tracks.

Key takeaways:
•The top seven most common insider threat focus areas, from accidental leaks to espionage
•What motivates these insider threat actors
•The risks of each type of insider threat
•Real-world examples of these threats in action
•Countermeasures to defend against each type of threat
Recorded Nov 14 2019 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michael Hill
Presentation preview: The Insider’s Motive: Defending Against the 7 Most Common Insider Threats
  • Channel
  • Channel profile
  • Zero Trust: A Cybersecurity Essential and the Key to Success Apr 16 2020 2:00 pm UTC 75 mins
    Michael Hill, Michael Zuckerman
    In our increasingly cloud-first world, the idea of a trusted internal network zone and an untrusted external one is now outdated.

    The truth is, today’s cyber-threats often get past perimeter defenses undetected, so you can no longer trust data traffic – no matter where it originates.

    That’s where zero trust architectures come in. In this webinar, discover why zero trust approaches are becoming an urgent cybersecurity priority for enterprise and government organizations alike.

    Key takeaways:
    •The security trends fueling the adoption of zero trust architectures
    •The critical role that DNS security plays in successful zero trust implementation
    •The key elements you need to have in place and the next steps for moving forward
  • #IMOS20 - The Resilience of Ransomware: A Relentless Foe Mar 25 2020 9:15 am UTC 60 mins
    Moderator: Michael Hill Speakers: Raef Meeuwisse, JamesChappell and Raj Samani
    This session will explore the current state of the ransomware risk landscape, assess why ransomware continues to be such a resilient attack threat and outline what makes for an effective, modern ransomware defense strategy.

    Key takeaways:
    •Why ransomware continues to be a damaging and effective attack vector
    •What does modern-day ransomware defense look like, and how to achieve it
    •What 2020 will have in store for ransomware
  • 2FA or MFA: Which Authentication is Right for Your Business? Mar 24 2020 3:00 pm UTC 75 mins
    Moderator: Dan Raywood - Speakers: Barry McMahon, James Gosnold
    Authentication works to ensure that you’re you. As technology evolves and business needs change, authentication methods need to be more dynamic. Today’s workforce demands flexibly in areas such as device choice, work location, and levels of access so that they can deliver in their role. Yet security teams still need to keep the business safe and secure. This is why authentication must to adapt based to deliver for the employee and the security team.

    On this webinar, we will look at the differences between two-factor authentication (2FA) and multi-factor authentication (MFA), assessing the strengths and weaknesses of both and what factors you can expect to use in both options. We will also look at going “Passwordless” and what that really means to the employee and the business.

    Key takeaways:

    • Why traditional two-factor authentication is no longer enough to protect your business
    • What the differences are between 2FA and MFA
    • The evolution of multi-factor authentication to include biometric and contextual factor
    • The “Passwordless” future
  • Gain Control and Security of Your File Collaboration Mar 24 2020 2:00 am UTC 75 mins
    Danny Bradbury
    There are a lot of file sharing and collaboration tools available today – both free and paid – and finding the solution that meets your business requirements can be difficult.

    Sharing files and collaborating securely shouldn’t be tricky, but in practice, organizations can be met with diverse challenges as they seek to master the file collaboration process in a secure and effective way. However, if well-managed, file collaboration can bring significant business benefits and improve overall operability.

    In this webinar, learn how to bring your file collaboration to the next level through security, flexibility and centralization.

    Key takeaways:
    •The importance of file collaboration for your organization
    •How to master upload, download and collaborate files securely
    •How to gain more control in cloud-based collaboration
  • Strategies to Scale and Upskill Your Security Team Mar 5 2020 3:00 pm UTC 75 mins
    Moderator: Dan Raywood - Speakers: Mike Campfield, Rik Turner, Deidre Diamond
    Businesses these days face two main challenges: they have too much technology, and they don’t have the people to run and manage it. This has led organizations to come up with new ways to make their existing security resources more effective, and scale their existing human and technology resources in the face of increasing vulnerabilities.

    In this webinar, we will discuss the challenges and opportunities facing security and IT teams when it comes to scaling their cybersecurity talent, how they can train and “upskill” staff members to fit with the problems of the enterprise.

    Key takeaways:

    •Why the issue shelfware has become a problem for businesses
    •How to efficiently train and get staff the necessary skills
    •How machine learning can help alleviate alert fatigue
    •Strategies for increasing collaboration between Security and Network Operations teams
  • AI in Security: Keeping Up with the Trend Recorded: Feb 25 2020 60 mins
    Moderator: Michael Hill Speakers: Dr David Day, Stuart Jackson and Maninder Pal Singh
    AI has been predicted to be a future technology to keep a close eye on, bringing benefits for both a reduction in demands upon staff and better endpoint protection detection. However, is it something that your business can consider as we move into a new decade, and how can use you AI and predictive analytics to ensure your security posture is maximized without having to compromise user experience, mobility, and productivity better protect and fix your situational risk elements?

    On this webinar, we will look at fresh predictions around AI, look at how it can fit into your business, what options exist for adoption, and how you can leverage adopt it for better situational protection and enable more intelligent security.

    Key takeaways:

    What the benefits and negatives of AI can be
    How AI can identify behavioural and location patterns to determine certain risk factors enable location-based detection for increased security
    Using situational awareness for device security and access
    How AI enable better user experience
  • Automation in Data File Transfer: Improving Security and Saving You Time Recorded: Feb 20 2020 58 mins
    Michael Hill,
    Are you manually transferring numerous files in your workplace? If so, you may be opening your organization up to various security risks and threats, not to mention potentially wasting valuable time and resources.

    Although there are a plethora of file transfer tools available, many rely on outdated methods that no longer cut the mustard. The modern enterprise needs a centralized and securely automated approach to file transfer management.

    This webinar will highlight the security risks of manual file transfer processes, explore the various benefits that automation can bring and explain how your organization can effectively and securely reinvigorate your file transfer management.

    Key takeaways:
    •The security risks and challenges that surround file transfer management
    •Why automation is the key to fast, secure and effective file transfers
    •How to ensure your organization is ahead of the game with its file transfer methods
  • Leveraging ISO 27001 to Manage Cyber & Information Security Risks Recorded: Feb 13 2020 67 mins
    Moderator: Dan Raywood - Speakers: Rob Acker, Gopalakrishnan Kary, Chris Oakley
    A systematic approach to protecting key information assets is a powerful weapon in combating information risks by helping determine the types of security controls needed. This is where standards of cyber and information security come in, and ISO 27001 has been one of the most popular for many years.

    In this webinar, we will look at how the ISO 27001 standard has come to be recognized as the international benchmark for information and cybersecurity practitioners, how to achieve it, and most importantly, what it takes to remain compliant.

    Key takeaways:

    What you need to consider to achieve ISO 27001 certification
    How to maintain compliance with ISO 27001 and other standards such as ISO 27701 and ISO 27018
    Top considerations and key lessons learned from information assurance
  • Making SOAR Work For You Recorded: Feb 6 2020 61 mins
    Moderator: Dan Raywood - Speakers: Nick Tausek, Joe Hancock. Andrew Hay
    Security operations, automation and response (SOAR) has become an essential tool for security, as it reduces manual, repetitive tasks and enables analysts to have a better working process. This can be a force multiplier for your security operations center, making life better for them?

    In this webinar, we will look at SOAR and where it can be used to make life easier for the analyst, what strategies you can use to have consistent processes that works and how to do more with less.

    Key takeaways:
    •What SOAR can mean for your business in 2020
    •How to implement an automation strategy
    •What SOAR strategies you can use to improve incident response
  • New Year, New Decade, New Threats and Challenges Recorded: Jan 9 2020 60 mins
    Moderators: Dan Raywood, Michael Hill, Speakers: Paul McKay, Brian Honan
    As a new year and new decade are upon us, the same number of predictions are consistently made about what we can expect in the near and far future. Whether it is more malware, greater and stronger attacks or more problems, it seems that the future seems forever negative.

    In this webinar, we will look at the various trends that have been predicted for the cybersecurity industry by the vendor and research communities, and evaluate what has come true in the past, and what we can genuinely expect the future to look like.

    Key takeaways:

    What the predictions for 2020 tell us about the coming year
    What 2019’s predictions were, and what came true
    Which platforms were predicted to be hit harder than they were
    What leading researchers believe will be the key trends for 2020
  • 2019 Cybersecurity Headlines in Review Recorded: Dec 19 2019 64 mins
    Moderators: Dan Raywood and Michael Hill, Speakers: Richard Santalesa, Becky Pinkard, Michael Flouton
    In December, Infosecurity Magazine will host its annual end of year webinar. Moderated by Michael Hill, editor, and Dan Raywood, deputy editor, the webinar will bring together a panel of experts to reflect on the key topics, trends and headlines that impacted the information security industry over the course of 2019.

    In a year which saw threats continue to evolve and mature, the announcement of huge intentions to fine under GDPR and the first $1m bug bounty launched, there were a plethora of talking points and incidents that affected data users and organizations all around the world.

    In this special webinar, Infosecurity will share the thoughts of industry thought leaders to gauge how 2019 will be remembered from the information security perspective.

    Key takeaways:
    •What were the cybersecurity trends that dominated the headlines in 2019, and was the right story told?
    •How threats and risks evolved in 2019, and what positive security strides were made
    •What trends will have the biggest impact in 2020, and is the industry ready for them?
  • Authentication Standards in 2019: Why Passwords Remain Problematic, and Future S Recorded: Dec 12 2019 63 mins
    Moderator: Dan Raywood, Speaker: Steven Furnell, Barry McMahon, Sarb Sembhi
    This year has seen more debate on the capability and problems of passwords as a method of authentication. The recent third Annual Global Password Security Report from LastPass revealed more issues with the use of password data, particularly around password re-use, and the continued need for passwords in stronger authentication methods.

    In this webinar, we will look at the results of the report and discuss trends from 2019 around password use, and what the analysis of 47,000 users teaches us about user behavior in authentication.

    Key takeaways:

    What 2019’s research, trends and news teaches us on authentication trends and changes
    How businesses stand up against industry standards on authentication
  • Fact & Fiction in Advanced Threat Detection Recorded: Dec 5 2019 63 mins
    Moderator: Michael Hill - Speakers: Rick Moy, John Grim & Jason Rowland
    Organizational threat detection is the process of using data to discover security threats across a business, both of internal and external nature. The objective is to find anomalies, analyze their threat level and determine what actions may be required to respond to them.

    In today’s multi-faceted cyber-threat landscape, having the ability to detect data security risks is of paramount importance, but effective data detection requires careful consideration and forethought.

    This webinar will examine the current data threat detection landscape, assess how data threat protection can be used to aid organizations in their information security strategies and outline best practices for successfully mastering the art of threat detection.

    Key takeaways:
    •Learn the importance of advanced threat protection in your organization
    •Discover strategies for implementing effective threat detection strategies
    •Learn about emerging technologies and approaches for threat detection and response
  • Clearing the Path to Software-Defined Segmentation Recorded: Dec 5 2019 63 mins
    Moderator: Dan Raywood - Speakers: Dave Klein, Anne Hardy, Tricia Howard
    Also known as micro-segmentation, there are many misnomers on what software-defined segmentation entails, it’s broad spectrum of use cases and what features are essential when selecting a software-defined segmentation solution.
    In this webinar, we will dive into the concept of software-defined segmentation and the challenges it brings about, along with outlining the essential components and steps that should be on your list when embarking on a segmentation project to guarantee an improved security posture.

    Key takeaways:
    • The challenges of software-defined segmentation
    • Software-Defined Segmentation use cases
    • Learn key software segmentation roll-out steps
    • Understand the solution requirements for software segmentation
    • How to carry out software segmentation correctly, quickly and easily
  • Zero Trust in Practice: Why Identity Drives Next-Gen Access Recorded: Nov 28 2019 57 mins
    Moderator: Michael Hill
    Zero Trust is quickly becoming the dominant security model for the cloud, shifting the perimeter from the network to the people and devices that make up a modern workforce.

    Traditional enterprise security models were built on an assumption that everything inside the network – whether its devices or people – is trustworthy. However, the evolution of attack sophistication and the proliferation of BYOD has brought greater risk, which means that newer, more holistic measures must be taken to ensure security across the business.

    Zero Trust can be used to effectively secure modern organizations from a variety of threats.

    However, implementing an effective zero trust approach is not without its challenges, and for a model with many moving parts, the immediate question is: where to start?

    This session will explore:
    • How to effectively manage a successful Zero Trust strategy
    • The full zero trust reference architecture and steps to get there
    • Why identity is the foundational layer to build contextual access controls from
  • #InfosecNA Video Interview: Cloud Security Recorded: Nov 21 2019 14 mins
    Michael Hill - Speakers: Frank Downs, Chris DeRamus and Monty LaRue
    Editor Michael Hill discusses the current state of play of cloud security, greatest challenges, best practices and paths of improvement with Frank Downs, ISACA director, cybersecurity practices; Chris DeRamus, CTO and co-founder, Divvy Cloud and Monty LaRue, Technical Leader, Cylidify.
  • #InfosecNA Video Interview: Security Awareness Recorded: Nov 21 2019 15 mins
    Michael Hill - Speakers: Asaf Weisberg and Andrej Volchkov
    Editor Michael Hill sat down with ISACA board director Asaf Weisberg and Andrej Volchkov, consultant, Stramizos at #InfosecNA 2019 to discuss all things #securityawareness
  • #InfosecNA Video Interview: Cyber Workforce Training and Skills Development Recorded: Nov 21 2019 12 mins
    Michael Hill - Speakers: Simone Petrella and Allan Boardman
    Editor Michael Hill sat down with Simone Petrella and Allan Boardman to discuss cyber workforce training/skills development at Infosecurity ISACA North America 2019.
  • #InfosecNA Video Interview: Proactive and Reactive Security Approaches Recorded: Nov 20 2019 16 mins
    Michael Hill - Speakers: Tom Brennan and Ian Glover
    Editor Michael Hill talks to Tom Brennan, Chair, CREST and Ian Glover, President, CREST about proactive and reactive security approaches at Infosecurity ISACA North America 2019.
  • #InfosecNA Video Interview: Christopher Kennedy Recorded: Nov 20 2019 10 mins
    Michael Hill - Speaker: Christopher Kennedy
    Editor Michael Hill sat down with Christopher Kennedy, CISO and VP of customer success AttackIQ at Infosecurity Isaca North America to discuss the MITRE ATT&CK framework.
Strategy - Insight - Technology
Dedicated to serving the information security community, in person, in print and online.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Insider’s Motive: Defending Against the 7 Most Common Insider Threats
  • Live at: Nov 14 2019 3:00 pm
  • Presented by: Michael Hill
  • From:
Your email has been sent.
or close