Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Insiders are the New Malware

via YouTube

Overview

Explore the critical issue of insider threats in cybersecurity through this 40-minute conference talk from Louisville InfoSec 2016. Delve into the evolving landscape of data breaches, examining common factors and their far-reaching impacts. Analyze the roles of CEOs, employee mistakes, and disgruntled workers in security vulnerabilities. Learn effective strategies to counter attackers, including understanding your data, implementing robust data protection methodologies, and managing IT risks. Discover the importance of eliminating global access, simplifying permissions, and identifying data owners. Gain insights on sustaining security measures through regular access reviews and automation. Understand the significance of protecting data from both internal and external threats, eliminating service accounts, and conducting comprehensive risk assessments to safeguard your organization's sensitive information.

Syllabus

Intro
How the company came about
Data Breaches
Key Things in Common
Impact of Breaches
CEO Problems
Employees make mistakes
Disgruntled employees
How do we stop attackers
Understand your data
Data protection methodology
IT risk
Global access
Eliminating global access
Simplifying permissions
Eliminate excessive access
Figure out where people have access
Sustain
Identify Data Owners
Make Decisions
Data Owner
Review Access
Automating
Protect your data
Protect from the inside
Protect from the outside
No more service accounts
Identify owners
Complete Coincidence
Risk Assessment

Reviews

Start your review of Insiders are the New Malware

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.