Protecting Against Insider Threat in 2020 - Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
Estás en »Webinars
Estás en »Webinars
Miércoles 10 de Jun, 2020
In the past few years, Insider Threat has evolved in several aspects from how sensitive data leaves the organization to ways in which privilege access gets misused, creating risks for organizations to mitigate. The proliferation of cloud applications had made tracking and protecting sensitive data extremely challenging. Add to this the current remote work setup in the midst of COVID-19, and one can imagine how hard it is to track, monitor, and protect your crown jewels. Insider threats can originate from malicious insiders or insiders that are simply negligent and do not follow best practices. Insider threats can also originate from compromised accounts that are controlled by an outsider. Given all the scenarios, monitoring solutions are forced to curate use cases in conjunction with purpose-built detection techniques in order to derive specific outcomes to be effective in detecting infractions. This shift in behavior is becoming more evident as organizations ramp up visibility into how its employees and contractors use their assets and resources over time. Join Shareth Ben (Executive Director, Insider Threat &Cyber Threat Analytics, Securonix) and Joseph Blankenship (Vice President, Research Director, Security & Risk, Forrester) to gain some insights into: • How Insider Threat has evolved over time and the new challenges it presents. • What are some of the most common Insider Threat behaviors observed in the field? • Which detection techniques are effective in detecting nefarious behaviors within the organization? • Walkthrough of the key trends and observations from the Securonix 2020 Insider Threat Report.
00:00 - 01:00 hs GMT+1
01:00 - 02:00 hs GMT+1
06:00 - 07:00 hs GMT+1
08:00 - 09:00 hs GMT+1
18:00 - 19:00 hs GMT+1
06:00 - 07:00 hs GMT+1
09:00 - 10:00 hs GMT+1
11:30 - 12:00 hs GMT+1
18:00 - 19:00 hs GMT+1
05:00 - 06:00 hs GMT+1
16:00 - 17:00 hs GMT+1
04:00 - 05:00 hs GMT+1
05:00 - 06:00 hs GMT+1
00:00 - 01:00 hs GMT+1
08:00 - 09:00 hs GMT+1
06:00 - 07:00 hs GMT+1
08:00 - 09:00 hs GMT+1
09:00 - 10:00 hs GMT+1
18:00 - 19:00 hs GMT+1
14:00 - 15:00 hs GMT+1
18:00 - 19:00 hs GMT+1
09:00 - 10:00 hs GMT+1
09:00 - 10:00 hs GMT+1
00:00 - 01:00 hs GMT+1
00:00 - 01:00 hs GMT+1
02:00 - 03:00 hs GMT+1
04:30 - 05:00 hs GMT+1
09:00 - 10:00 hs GMT+1
15:00 - 16:00 hs GMT+1
10:00 - 11:00 hs GMT+1
16:00 - 17:00 hs GMT+1
05:00 - 06:00 hs GMT+1
09:00 - 10:00 hs GMT+1
00:00 - 01:00 hs GMT+1
06:30 - 07:00 hs GMT+1
03:00 - 04:00 hs GMT+1
05:00 - 06:00 hs GMT+1
10:00 - 11:00 hs GMT+1
18:00 - 19:00 hs GMT+1
05:00 - 06:00 hs GMT+1
08:00 - 09:00 hs GMT+1
00:00 - 01:00 hs GMT+1
01:00 - 02:00 hs GMT+1
06:00 - 07:00 hs GMT+1
08:00 - 09:00 hs GMT+1
18:00 - 19:00 hs GMT+1
06:00 - 07:00 hs GMT+1
09:00 - 10:00 hs GMT+1
La Autoridad Portuaria de la Bahía de Algeciras (APBA) ha instalado cámaras térmicas en las zonas de mayor tránsito de pasajeros del puerto para controlar la temperatura corporal de los pasajeros sin necesidad de pararles. ... Leer más ►
Publicado el 2-Jul-2020 • 14.23hs
Publicado el 25-Ene-2017 • 19.27hs
Publicado el 20-Ene-2017 • 13.11hs
Publicamos grabación de webinar que tuvo lugar el pasado 28/03/2019 por el CIO del Grupo de Medios de Comunicación español Vocento Jorge Oteo en el que explica su visión de la Ciberseguridad hoy. ... Leer más ►
Publicado el 29-Mar-2019 • 10.12hs
Publicado el 20-Jun-2018 • 11.21hs
Publicado el 31-May-2018 • 10.21hs
... Leer más ►
Publicado el 23-Jun-2020 • 16.05hs
Publicado el 26-Set-2019 • 10.36hs
Publicado el 26-Mar-2019 • 12.09hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs