Insider Threat Considerations You May Have Overlooked
            
                            Join us to gain additional insights into the insider threat topic that are often overlooked and take away some quick wins and additional considerations to bolster your cyber readiness.
            
                                                
	We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
                                 
                Watch On-Demand
            
            
                
                
            
            
            
            
            
            
                When insider threats are discussed they are more than often focused on a malicious employee’s deliberate misuse of company data, resulting in loss of IP, a heavy fine for a data breach, or both. Solutions for tighter access control, monitoring and data loss prevention solutions are then often aligned to this discussion as the solution in which to invest to mitigate this risk. 
  What happens though, when there are users granted privileged access who inadvertently fall short at your first line of defense – passwords and access policies which have been configured with less obvious settings that can be leveraged in an attack, or authentication methods in place that can be bypassed though social engineering?
Today’s world is very different from a little over a year ago, we’ve seen  a move towards remote-working and furloughing of employees which brings associated risks and alongside this, cyber attacks are on the increase and becoming more sophisticated.
 Join us to gain additional insights into the insider threat topic that are often overlooked and take away some quick wins and additional considerations to bolster your cyber readiness. 
- As the insider threat topic is usually a narrow view, additional insights into the insider threat topic that are often overlooked
- Considerations for remote workers and furloughed employees
- Quick wins and solutions available to mitigate risk further against cyber threats 
 
                
                                    Speakers
                                            
                            
                                                                     Darren James
                                
                                
                                    
                                        Darren James
                                    
                                    Product Specialist and Technical Lead
                                    Specops Software
                                
                             
                                                            
                                    20+ years experience in IT. Having worked as consultant across many sectors and many different sizes of organizations from central/local governments, to retail and energy companies Specializing in Active Directory, Azure AD and Group Policy. Worked at Specops for nearly 10 years and loving every minute!
                                 
                                                      
                                    
                
                                    Sponsors
                                            
                             
                        
                                    
                
                                                            
	We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
 
                    
                    Watch On-Demand