Threat actors abound; from cyber criminals and hacktivists to nation-states and malicious insiders many organizations are finding themselves at a crisis point. Perhaps the most technically and politically challenging of all these threats to mitigate are insiders. When the enemy is already inside, or masquerading as a legitimate insider, most security controls offer little to no value. The “bad guys” are getting the upper hand and for every insider discovered many more are going unnoticed.
Cybersecurity experts all agree, that in most cases, the data necessary to mitigate insider threats is already being captured by the agency. What agencies are lacking is the ability exploit the vast lakes of data to more efficiently and effectively predict, prevent, detect and respond to malicious insiders.
Attendees will gain insight into how insiders operate and their motivations through multiple real-world use cases. They will also be exposed to various technical and non-technical insider mitigation techniques related to: