Incident & Breach Response
Next-Generation Technologies & Secure Development
2015 Insider Threat Report
Information is the life blood of modern business - and increasingly under attack from both traditional insiders motivated by financial gain, and external hackers that compromise insider accounts for criminal purposes and nation state goals.
With insider threats spanning both these areas, this webinar features Ovum Principal Analyst Andrew Kellett, author of the 2015 Vormetric Insider Threat Report and Tina Stewart Vice President of Marketing with Vormetric detailing the findings of the report and their implications for business.
Register for this webinar to learn:
- Rates at which enterprises are encountering data breaches and failing security audits.
- Industry and analyst views on where data most needs protecting, and what defenses are most effective.
- The security controls most used to protect from privileged user abuse.
- The most dangerous employee-which insiders pose the greatest risks.
Insider Threats now play a major role in almost all of the high profile data breaches being experienced globally. If a primary element in a breach wasn't a traditional insider, as in the Korean Credit card breach where 40% of Korean's data was stolen or when Brian Manning breached confidential intelligence records, it was a privileged user who managed systems like Edward Snowden using their position to gain access to sensitive data. Or there's the Sony and Target hacks, where privileged user credentials were compromised and used to steal sensitive data, and even wipe out critical systems.
This webinar brings together highly respected IT Security Analyst Andrew Kellet from Ovum (Author of both the 2014 and 2015 Vormetric Insider Threat Reports), and Tina Stewart VP of Marketing for Vormetric to discuss the results and highlight the learnings from this year's 2015 Vormetric Insider Threat Report.
The report, based on polling by Harris (a subsidiary on Nielsen), combines global survey data from 818 global enterprise IT professionals with Andrew Kellett's dynamic analysis to pinpoint risks, security stances and insights into how organizations can keep from becoming a statistic.
Here's a sample of some of the findings to be discussed:
- The percentages of US and international enterprises polled who had experienced a data breach or failed a compliance audit in the last year.
- Details of which users are considered most dangerous, and the variation in findings by geography.
- Core recommendations for preventing breaches based on insider threats, and minimizing losses when they occur.
Have an account? Sign in.
You might also be interested in …