SC Magazine hosts e-symposium today on insider threat

Join us online today for the latest free SC eSymposium: Insiders with access.

A recent study found that IT administrators and information security professionals do use their power for evil by accessing confidential information that is not pertinent to their duties.

A prominent example of that is WikiLeaks, which is just the latest in a string of data leaks that can be traced to trusted insiders. Disgruntled insiders with access to sensitive information are now more closely working with organized cybergangs to provide corporate account information, such as authentication credentials.

How should organizations ensure they're keeping in check even privileged users? And what generally should they do to combat these still persistent insider threats?

Our symposium today will take a look at the trends and problems, and examine the best ways to deal with these.

The virtual show floor opens up at 1 p.m. EST, and the first keynote by Jaime Chanaga, founder and president of The CSO Board, starts at 1:15 p.m. EST.

For more information and to register for free, click here.

Earn CPE credits for attending!

Sign up to our newsletters

More in News

House Intelligence Committee OKs amended version of controversial CISPA

Despite the 18-to-2 vote in favor of the bill proposal, privacy advocates likely will not be satisfied, considering two key amendments reportedly were shot down.

Judge rules hospital can ask ISP for help in ID'ing alleged hackers

The case stems from two incidents where at least one individual is accused of accessing the hospital's network to spread "defamatory" messages to employees.

Three LulzSec members plead guilty in London

Ryan Ackroyd, 26; Jake Davis, 20; and Mustafa al-Bassam, 18, who was not named until now because of his age, all admitted their involvement in the hacktivist gang's attack spree.