Главная
Study mode:
on
1
Intro
2
How the company came about
3
Data Breaches
4
Key Things in Common
5
Impact of Breaches
6
CEO Problems
7
Employees make mistakes
8
Disgruntled employees
9
How do we stop attackers
10
Understand your data
11
Data protection methodology
12
IT risk
13
Global access
14
Eliminating global access
15
Simplifying permissions
16
Eliminate excessive access
17
Figure out where people have access
18
Sustain
19
Identify Data Owners
20
Make Decisions
21
Data Owner
22
Review Access
23
Automating
24
Protect your data
25
Protect from the inside
26
Protect from the outside
27
No more service accounts
28
Identify owners
29
Complete Coincidence
30
Risk Assessment
Description:
Explore the critical issue of insider threats in cybersecurity through this 40-minute conference talk from Louisville InfoSec 2016. Delve into the evolving landscape of data breaches, examining common factors and their far-reaching impacts. Analyze the roles of CEOs, employee mistakes, and disgruntled workers in security vulnerabilities. Learn effective strategies to counter attackers, including understanding your data, implementing robust data protection methodologies, and managing IT risks. Discover the importance of eliminating global access, simplifying permissions, and identifying data owners. Gain insights on sustaining security measures through regular access reviews and automation. Understand the significance of protecting data from both internal and external threats, eliminating service accounts, and conducting comprehensive risk assessments to safeguard your organization's sensitive information.

Insiders are the New Malware

Add to list
0:00 / 0:00