SC Magazine hosts e-symposium today on insider threat

Join us online today for the latest free SC eSymposium: Insiders with access.

A recent study found that IT administrators and information security professionals do use their power for evil by accessing confidential information that is not pertinent to their duties.

A prominent example of that is WikiLeaks, which is just the latest in a string of data leaks that can be traced to trusted insiders. Disgruntled insiders with access to sensitive information are now more closely working with organized cybergangs to provide corporate account information, such as authentication credentials.

How should organizations ensure they're keeping in check even privileged users? And what generally should they do to combat these still persistent insider threats?

Our symposium today will take a look at the trends and problems, and examine the best ways to deal with these.

The virtual show floor opens up at 1 p.m. EST, and the first keynote by Jaime Chanaga, founder and president of The CSO Board, starts at 1:15 p.m. EST.

For more information and to register for free, click here.

Earn CPE credits for attending!

More in News

Privacy-bolstering "Apps Act" introduced in House

The bill would provide consumers nationwide with similar protections already enforced by a California law.

Microsoft readies permanent fix for Internet Explorer bug used in energy attacks

Microsoft is prepping a whopper of a security update that will close 33 vulnerabilities, likely including an Internet Explorer (IE) flaw that has been used in targeted website attacks against the U.S. government.

Weakness in Adobe ColdFusion allowed court hackers access to 160K SSNs

Up to 160,000 Social Security numbers and one million driver's license numbers may have been accessed by intruders.