Detectar los hackers internos en la organización con Ziften.com - Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
Estás en »Webinars
Estás en »Webinars
Martes 11 de Jul, 2017
Industry statistics point to 1 in 5 enterprise breaches involve insider actions. Insider threats are often the costliest and most disruptive to an enterprise - even highly secure enterprises (think Edward Snowden). According to the FBI, “the thief who is harder to detect and who could cause the most damage is the insider—the employee with legitimate access.” With the insider there is no malware necessary, no access rule violations, no credentials theft, no command and control traffic, no firewall intrusions. Your enterprise is mounting a Maginot Line defense against the knowledgeable insider, gun emplacements facing away from the real threat, easily bypassed. Security is breached, critical data is exfiltrated, and any data privacy is vaporized as your most sensitive data assets appear for sale on the dark web, while embarrassing revelations are leaked online, making headline news, triggering investigations and resignations. In this episode in the Threat Hunting series, we will review: - The insider threat defense futility of traditional security placebos - Essential visibility for effective user and endpoint activity monitoring - Sensor and effector instrumentation to quickly observe and promptly thwart malicious insider activity - Instrumentation customization for enterprise-specific tailoring - The transition from routine operations team user support to security team insider threat awareness - Spatial and temporal anomaly types associated with insider threats - The FBI’s insider threat kill chain - The importance of forensic lookback - Exfiltration routes favored by insiders
00:00 - 01:00 hs GMT+1
01:00 - 02:00 hs GMT+1
06:00 - 07:00 hs GMT+1
08:00 - 09:00 hs GMT+1
18:00 - 19:00 hs GMT+1
06:00 - 07:00 hs GMT+1
09:00 - 10:00 hs GMT+1
11:30 - 12:00 hs GMT+1
18:00 - 19:00 hs GMT+1
05:00 - 06:00 hs GMT+1
16:00 - 17:00 hs GMT+1
04:00 - 05:00 hs GMT+1
05:00 - 06:00 hs GMT+1
00:00 - 01:00 hs GMT+1
08:00 - 09:00 hs GMT+1
06:00 - 07:00 hs GMT+1
08:00 - 09:00 hs GMT+1
09:00 - 10:00 hs GMT+1
18:00 - 19:00 hs GMT+1
14:00 - 15:00 hs GMT+1
18:00 - 19:00 hs GMT+1
09:00 - 10:00 hs GMT+1
09:00 - 10:00 hs GMT+1
00:00 - 01:00 hs GMT+1
00:00 - 01:00 hs GMT+1
02:00 - 03:00 hs GMT+1
04:30 - 05:00 hs GMT+1
09:00 - 10:00 hs GMT+1
15:00 - 16:00 hs GMT+1
10:00 - 11:00 hs GMT+1
16:00 - 17:00 hs GMT+1
05:00 - 06:00 hs GMT+1
09:00 - 10:00 hs GMT+1
00:00 - 01:00 hs GMT+1
06:30 - 07:00 hs GMT+1
03:00 - 04:00 hs GMT+1
05:00 - 06:00 hs GMT+1
10:00 - 11:00 hs GMT+1
18:00 - 19:00 hs GMT+1
05:00 - 06:00 hs GMT+1
08:00 - 09:00 hs GMT+1
00:00 - 01:00 hs GMT+1
01:00 - 02:00 hs GMT+1
06:00 - 07:00 hs GMT+1
08:00 - 09:00 hs GMT+1
18:00 - 19:00 hs GMT+1
06:00 - 07:00 hs GMT+1
09:00 - 10:00 hs GMT+1
La Autoridad Portuaria de la Bahía de Algeciras (APBA) ha instalado cámaras térmicas en las zonas de mayor tránsito de pasajeros del puerto para controlar la temperatura corporal de los pasajeros sin necesidad de pararles. ... Leer más ►
Publicado el 2-Jul-2020 • 14.23hs
Publicado el 25-Ene-2017 • 19.27hs
Publicado el 20-Ene-2017 • 13.11hs
Publicamos grabación de webinar que tuvo lugar el pasado 28/03/2019 por el CIO del Grupo de Medios de Comunicación español Vocento Jorge Oteo en el que explica su visión de la Ciberseguridad hoy. ... Leer más ►
Publicado el 29-Mar-2019 • 10.12hs
Publicado el 20-Jun-2018 • 11.21hs
Publicado el 31-May-2018 • 10.21hs
... Leer más ►
Publicado el 23-Jun-2020 • 16.05hs
Publicado el 26-Set-2019 • 10.36hs
Publicado el 26-Mar-2019 • 12.09hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs