Insider Threats are quickly becoming one of the greatest cyber security threats that organizations face today. They are responsible for three million records are stolen every day and at the heart of 57% of all database breaches last year (Verizon 2019). Research also shows that the average time to spot and contain an insider threat is a massive 77 days -- just 13% of incidents are caught within 30 days (Ponemon 2020). The reason they are so prolific and take so long to deal with is because anyone with legitimate, trusted access to an organization’s systems and data – whether full-time employee, part-time contractor or strategic business partner – can be an Insider Threat. Managing insider threats fundamentally requires a people-centric approach. With the acquisition of ObserveIT, Proofpoint adds a powerful Insider Threat Management platform to our portfolio of People Centric cybersecurity solutions. The ObserveIT platform delivers unique capability to monitor both user and file activity, enabling security and compliance professionals can be alerted to risky, out-of-policy activities and any unexplained changes in user behavior in real-time; successfully stopping and investigating any activity before it becomes a full-blown breach. Join ObserveIT | Proofpoint SVP Mayank Choudhary, in this webinar to: · Learn how the key components of full visibility – user activity, data activity, and behavior analytics – provide the necessary context to understanding Insider Threats · Discover how an organization’s risk of an Insider Threat can be reduced through always-on monitoring, without compromising user privacy and compliance; with real-life case studies to illustrate · See a demo explaining of how out-of-policy user activity is detected and investigated on-the-spot · Learn about the different types of Insider Threats and find out what steps you can take to build your own Insider Threat Management program

Hora

11:00 - 12:00 hs GMT+1

Organizador

Proofpoint
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2020 751 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 01 de Junio de 2020
Mar 02 de Junio de 2020
Mié 03 de Junio de 2020
Jue 04 de Junio de 2020
Vie 05 de Junio de 2020
Sáb 06 de Junio de 2020
Dom 07 de Junio de 2020
Lun 08 de Junio de 2020
Mar 09 de Junio de 2020
Mié 10 de Junio de 2020
Jue 11 de Junio de 2020
Vie 12 de Junio de 2020
Sáb 13 de Junio de 2020
Dom 14 de Junio de 2020
Lun 15 de Junio de 2020
  • 5 Steps to Security Validation

    20:00 - 21:00 hs GMT+1

    Fecha
    Lun 15-Jun-2020, 20:00 - 21:00 hs GMT+1
    Descripción
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we (...)
    Cerrar
Mar 16 de Junio de 2020
Mié 17 de Junio de 2020
Jue 18 de Junio de 2020