The Enemy Within: Detecting and Mitigating Insider Threats
With 100,000 new infections per day, ransomware has gotten the attention of executives, IT personnel and end users. Though not typically considered an insider threat, ransomware behaves like an insider - using hijacked identities to encrypt files on endpoints and file shares. Insiders have had broad access to data resources for years. Most organizations admit they have limited knowledge about how insiders use data. So why the sudden spike in breaches? What does it mean? In this session, learn how organizations are not only fighting ransomware, but also using it to identify and confront vulnerabilities that expose them to other insider threats, like rogue employees, abusive administrators, and hackers. In terms of insider threats, ransomware may be both scourge and savior.
See Also: New OnDemand | Reacting with Split-Second Agility to Prevent Software Supply Chain Breaches
Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.