Skip to content ↓ | Skip to navigation ↓

Your organization’s greatest assets are also its greatest threat: People. Your greatest risk are those you trust. Last year, more than a third of data breaches were perpetrated by a malicious insider, such as an employee, contractor or trusted business partner.

On average, an attack by an insider is also more likely to cost the most, averaging $412K per incident.

The intentions of these insiders can be sabotage, fraud, intellectual property theft or espionage. However, in many cases, patterns of detectable behavior and network activity emerge that provide indicators of risk, assist in early detection and in speeding up response time of an actual incident.

pic

In this upcoming webinar we will:

  • Discuss how human resources, legal and IT can work together to help prevent insider threats before they become a problem.
  • Identify risk indicators with employee attitudes and behavior and how it correlates to their patterns of activity on your network.
  • Show how you can use log intelligence and security analytics to automate actions and alerts and rapid reporting and forensics.

Webinar Details:

  • Date: May 08, 2014
  • Time: 11:00 AM Pacific/2:00 PM Eastern
  • Duration: One Hour

learn more and register

Register today to join us for this informative webcast.

Dozens of previously aired webcasts covering topics like Security Configuration Management, Compliance Automation and Achieving Continuous Monitoring are available for viewing HERE

 

Resources:

picCheck out Tripwire SecureScan™, a free, cloud-based vulnerability management service  for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management easily accessible to small and medium-sized businesses that may not have the resources for enterprise-grade security technology – and it detects the Heartbleed vulnerability.

 

picThe Executive’s Guide to the Top 20 Critical Security Controls

Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].

 

Title image courtesy of ShutterStock