Incident Response, TDR

SC Magazine hosts e-symposium today on insider threat

Join us online today for the latest free SC eSymposium: Insiders with access.

A recent study found that IT administrators and information security professionals do use their power for evil by accessing confidential information that is not pertinent to their duties.

A prominent example of that is WikiLeaks, which is just the latest in a string of data leaks that can be traced to trusted insiders. Disgruntled insiders with access to sensitive information are now more closely working with organized cybergangs to provide corporate account information, such as authentication credentials.

How should organizations ensure they're keeping in check even privileged users? And what generally should they do to combat these still persistent insider threats?

Our symposium today will take a look at the trends and problems, and examine the best ways to deal with these.

The virtual show floor opens up at 1 p.m. EST, and the first keynote by Jaime Chanaga, founder and president of The CSO Board, starts at 1:15 p.m. EST.

For more information and to register for free, click here.

Earn CPE credits for attending!

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.