The Insider’s Motive: Defending Against the 7 Most Common Insider Threats
Insiders have something outside threat actors never will: trust. They’ve surpassed the challenge of external security defenses and can navigate sensitive internal resources with breakneck speed.
Today, 60% of attacks are carried out by insiders (IBM Cyber Security Intelligence Index), and the average cost of this type of breach is $8.76m (Ponemon Institute).
Unfortunately, many teams aren’t equipped to act quickly to detect and stop these incidents before it’s too late.
In this webinar, we will explore the top motives of insider threats and outline how organizations can determine the right countermeasures to stop both accidental and malicious insider threats in their tracks.
•The top seven most common insider threat focus areas, from accidental leaks to espionage
•What motivates these insider threat actors
•The risks of each type of insider threat
•Real-world examples of these threats in action
•Countermeasures to defend against each type of threat
RecordedNov 14 201961 mins
Your place is confirmed, we'll send you email reminders
In our increasingly cloud-first world, the idea of a trusted internal network zone and an untrusted external one is now outdated.
The truth is, today’s cyber-threats often get past perimeter defenses undetected, so you can no longer trust data traffic – no matter where it originates.
That’s where zero trust architectures come in. In this webinar, discover why zero trust approaches are becoming an urgent cybersecurity priority for enterprise and government organizations alike.
•The security trends fueling the adoption of zero trust architectures
•The critical role that DNS security plays in successful zero trust implementation
•The key elements you need to have in place and the next steps for moving forward
Moderator: Michael Hill Speakers: Raef Meeuwisse, JamesChappell and Raj Samani
This session will explore the current state of the ransomware risk landscape, assess why ransomware continues to be such a resilient attack threat and outline what makes for an effective, modern ransomware defense strategy.
•Why ransomware continues to be a damaging and effective attack vector
•What does modern-day ransomware defense look like, and how to achieve it
•What 2020 will have in store for ransomware
Moderator: Dan Raywood - Speakers: Barry McMahon, James Gosnold
Authentication works to ensure that you’re you. As technology evolves and business needs change, authentication methods need to be more dynamic. Today’s workforce demands flexibly in areas such as device choice, work location, and levels of access so that they can deliver in their role. Yet security teams still need to keep the business safe and secure. This is why authentication must to adapt based to deliver for the employee and the security team.
On this webinar, we will look at the differences between two-factor authentication (2FA) and multi-factor authentication (MFA), assessing the strengths and weaknesses of both and what factors you can expect to use in both options. We will also look at going “Passwordless” and what that really means to the employee and the business.
• Why traditional two-factor authentication is no longer enough to protect your business
• What the differences are between 2FA and MFA
• The evolution of multi-factor authentication to include biometric and contextual factor
• The “Passwordless” future
There are a lot of file sharing and collaboration tools available today – both free and paid – and finding the solution that meets your business requirements can be difficult.
Sharing files and collaborating securely shouldn’t be tricky, but in practice, organizations can be met with diverse challenges as they seek to master the file collaboration process in a secure and effective way. However, if well-managed, file collaboration can bring significant business benefits and improve overall operability.
In this webinar, learn how to bring your file collaboration to the next level through security, flexibility and centralization.
•The importance of file collaboration for your organization
•How to master upload, download and collaborate files securely
•How to gain more control in cloud-based collaboration
Moderator: Dan Raywood - Speakers: Mike Campfield, Rik Turner, Deidre Diamond
Businesses these days face two main challenges: they have too much technology, and they don’t have the people to run and manage it. This has led organizations to come up with new ways to make their existing security resources more effective, and scale their existing human and technology resources in the face of increasing vulnerabilities.
In this webinar, we will discuss the challenges and opportunities facing security and IT teams when it comes to scaling their cybersecurity talent, how they can train and “upskill” staff members to fit with the problems of the enterprise.
•Why the issue shelfware has become a problem for businesses
•How to efficiently train and get staff the necessary skills
•How machine learning can help alleviate alert fatigue
•Strategies for increasing collaboration between Security and Network Operations teams
Moderator: Michael Hill Speakers: Dr David Day, Stuart Jackson and Maninder Pal Singh
AI has been predicted to be a future technology to keep a close eye on, bringing benefits for both a reduction in demands upon staff and better endpoint protection detection. However, is it something that your business can consider as we move into a new decade, and how can use you AI and predictive analytics to ensure your security posture is maximized without having to compromise user experience, mobility, and productivity better protect and fix your situational risk elements?
On this webinar, we will look at fresh predictions around AI, look at how it can fit into your business, what options exist for adoption, and how you can leverage adopt it for better situational protection and enable more intelligent security.
What the benefits and negatives of AI can be
How AI can identify behavioural and location patterns to determine certain risk factors enable location-based detection for increased security
Using situational awareness for device security and access
How AI enable better user experience
Are you manually transferring numerous files in your workplace? If so, you may be opening your organization up to various security risks and threats, not to mention potentially wasting valuable time and resources.
Although there are a plethora of file transfer tools available, many rely on outdated methods that no longer cut the mustard. The modern enterprise needs a centralized and securely automated approach to file transfer management.
This webinar will highlight the security risks of manual file transfer processes, explore the various benefits that automation can bring and explain how your organization can effectively and securely reinvigorate your file transfer management.
•The security risks and challenges that surround file transfer management
•Why automation is the key to fast, secure and effective file transfers
•How to ensure your organization is ahead of the game with its file transfer methods
Moderator: Dan Raywood - Speakers: Rob Acker, Gopalakrishnan Kary, Chris Oakley
A systematic approach to protecting key information assets is a powerful weapon in combating information risks by helping determine the types of security controls needed. This is where standards of cyber and information security come in, and ISO 27001 has been one of the most popular for many years.
In this webinar, we will look at how the ISO 27001 standard has come to be recognized as the international benchmark for information and cybersecurity practitioners, how to achieve it, and most importantly, what it takes to remain compliant.
What you need to consider to achieve ISO 27001 certification
How to maintain compliance with ISO 27001 and other standards such as ISO 27701 and ISO 27018
Top considerations and key lessons learned from information assurance
Moderator: Dan Raywood - Speakers: Nick Tausek, Joe Hancock. Andrew Hay
Security operations, automation and response (SOAR) has become an essential tool for security, as it reduces manual, repetitive tasks and enables analysts to have a better working process. This can be a force multiplier for your security operations center, making life better for them?
In this webinar, we will look at SOAR and where it can be used to make life easier for the analyst, what strategies you can use to have consistent processes that works and how to do more with less.
•What SOAR can mean for your business in 2020
•How to implement an automation strategy
•What SOAR strategies you can use to improve incident response
Moderators: Dan Raywood, Michael Hill, Speakers: Paul McKay, Brian Honan
As a new year and new decade are upon us, the same number of predictions are consistently made about what we can expect in the near and far future. Whether it is more malware, greater and stronger attacks or more problems, it seems that the future seems forever negative.
In this webinar, we will look at the various trends that have been predicted for the cybersecurity industry by the vendor and research communities, and evaluate what has come true in the past, and what we can genuinely expect the future to look like.
What the predictions for 2020 tell us about the coming year
What 2019’s predictions were, and what came true
Which platforms were predicted to be hit harder than they were
What leading researchers believe will be the key trends for 2020
Moderators: Dan Raywood and Michael Hill, Speakers: Richard Santalesa, Becky Pinkard, Michael Flouton
In December, Infosecurity Magazine will host its annual end of year webinar. Moderated by Michael Hill, editor, and Dan Raywood, deputy editor, the webinar will bring together a panel of experts to reflect on the key topics, trends and headlines that impacted the information security industry over the course of 2019.
In a year which saw threats continue to evolve and mature, the announcement of huge intentions to fine under GDPR and the first $1m bug bounty launched, there were a plethora of talking points and incidents that affected data users and organizations all around the world.
In this special webinar, Infosecurity will share the thoughts of industry thought leaders to gauge how 2019 will be remembered from the information security perspective.
•What were the cybersecurity trends that dominated the headlines in 2019, and was the right story told?
•How threats and risks evolved in 2019, and what positive security strides were made
•What trends will have the biggest impact in 2020, and is the industry ready for them?
Moderator: Dan Raywood, Speaker: Steven Furnell, Barry McMahon, Sarb Sembhi
This year has seen more debate on the capability and problems of passwords as a method of authentication. The recent third Annual Global Password Security Report from LastPass revealed more issues with the use of password data, particularly around password re-use, and the continued need for passwords in stronger authentication methods.
In this webinar, we will look at the results of the report and discuss trends from 2019 around password use, and what the analysis of 47,000 users teaches us about user behavior in authentication.
What 2019’s research, trends and news teaches us on authentication trends and changes
How businesses stand up against industry standards on authentication
Moderator: Michael Hill - Speakers: Rick Moy, John Grim & Jason Rowland
Organizational threat detection is the process of using data to discover security threats across a business, both of internal and external nature. The objective is to find anomalies, analyze their threat level and determine what actions may be required to respond to them.
In today’s multi-faceted cyber-threat landscape, having the ability to detect data security risks is of paramount importance, but effective data detection requires careful consideration and forethought.
This webinar will examine the current data threat detection landscape, assess how data threat protection can be used to aid organizations in their information security strategies and outline best practices for successfully mastering the art of threat detection.
•Learn the importance of advanced threat protection in your organization
•Discover strategies for implementing effective threat detection strategies
•Learn about emerging technologies and approaches for threat detection and response
Moderator: Dan Raywood - Speakers: Dave Klein, Anne Hardy, Tricia Howard
Also known as micro-segmentation, there are many misnomers on what software-defined segmentation entails, it’s broad spectrum of use cases and what features are essential when selecting a software-defined segmentation solution.
In this webinar, we will dive into the concept of software-defined segmentation and the challenges it brings about, along with outlining the essential components and steps that should be on your list when embarking on a segmentation project to guarantee an improved security posture.
• The challenges of software-defined segmentation
• Software-Defined Segmentation use cases
• Learn key software segmentation roll-out steps
• Understand the solution requirements for software segmentation
• How to carry out software segmentation correctly, quickly and easily
Zero Trust is quickly becoming the dominant security model for the cloud, shifting the perimeter from the network to the people and devices that make up a modern workforce.
Traditional enterprise security models were built on an assumption that everything inside the network – whether its devices or people – is trustworthy. However, the evolution of attack sophistication and the proliferation of BYOD has brought greater risk, which means that newer, more holistic measures must be taken to ensure security across the business.
Zero Trust can be used to effectively secure modern organizations from a variety of threats.
However, implementing an effective zero trust approach is not without its challenges, and for a model with many moving parts, the immediate question is: where to start?
This session will explore:
• How to effectively manage a successful Zero Trust strategy
• The full zero trust reference architecture and steps to get there
• Why identity is the foundational layer to build contextual access controls from
Michael Hill - Speakers: Frank Downs, Chris DeRamus and Monty LaRue
Editor Michael Hill discusses the current state of play of cloud security, greatest challenges, best practices and paths of improvement with Frank Downs, ISACA director, cybersecurity practices; Chris DeRamus, CTO and co-founder, Divvy Cloud and Monty LaRue, Technical Leader, Cylidify.