Insider Threat Considerations You May Have Overlooked

Join us to gain additional insights into the insider threat topic that are often overlooked and take away some quick wins and additional considerations to bolster your cyber readiness.

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.

This FREE webinar was recorded on:
01 April, 2021
11:00 AM - 12:00 PM EST

When insider threats are discussed they are more than often focused on a malicious employee’s deliberate misuse of company data, resulting in loss of IP, a heavy fine for a data breach, or both. Solutions for tighter access control, monitoring and data loss prevention solutions are then often aligned to this discussion as the solution in which to invest to mitigate this risk.

What happens though, when there are users granted privileged access who inadvertently fall short at your first line of defense – passwords and access policies which have been configured with less obvious settings that can be leveraged in an attack, or authentication methods in place that can be bypassed though social engineering?

Today’s world is very different from a little over a year ago, we’ve seen a move towards remote-working and furloughing of employees which brings associated risks and alongside this, cyber attacks are on the increase and becoming more sophisticated.

Join us to gain additional insights into the insider threat topic that are often overlooked and take away some quick wins and additional considerations to bolster your cyber readiness.


  • As the insider threat topic is usually a narrow view, additional insights into the insider threat topic that are often overlooked
  • Considerations for remote workers and furloughed employees
  • Quick wins and solutions available to mitigate risk further against cyber threats

Speakers

Darren James
Product Specialist and Technical Lead
Specops Software

20+ years experience in IT. Having worked as consultant across many sectors and many different sizes of organizations from central/local governments, to retail and energy companies Specializing in Active Directory, Azure AD and Group Policy. Worked at Specops for nearly 10 years and loving every minute!

Sponsors


We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.