How to detect and respond to insider threats using SOAR
Join this SC Media UK webinar, brought to you in partnership with Swimlane, to get up to speed on preventing and handling insider threats to your organisation
Malicious, accidental or fake insiders (attackers using legitimate credentials) are responsible for a third of all data breaches reports the 2019 Data Breach Investigation Report. And 90 per cent of tech crimes are committed by employees, with most data breaches simply down to having access and opportunity.
In one survey, 75 per cent of employees said that they have access to data they shouldn’t, and 25 per cent said they would be willing to sell company data to a competitor for less than £6,000.
Join this SC Media UK webinar, brought to you in partnership with Swimlane, to learn how you can integrate all your insider threat detection tools using security orchestration, automation and response (SOAR) as you investigate, respond to and report on insider threats and in turn increase your organisation’s ability to protect your company’s sensitive information, and that of your staff and customers.
Loading feed
Speakers
Josh RickardSecurity Research EngineerSwimlane
Bio
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
Josh Richard focuses on creating tools to help automate everyday processes. He is a GIAC Certified Windows Security Administrator and GIAC Certified Forensic Analyst. He has a diverse background ranging from system administration to digital forensics and incident response.
Sarb SembhiCTO & CISOVirtually Informed
Sarb speaks, writes and contributes to global security events and publications. He is the Workstream Lead for Thought Leadership of UK Cyber Security Council, and Co-Vice Chair of the Smart Buildings Working Group of the IoT Security Foundation. He has advised and sits on several start-up boards and is a Mentor on the Cylon accelerator programme. Sarb was shortlisted 16th in the IFSecGlobal 2018 20 Most Influential People in Cyber Security and included in "2018 Tyto Tech 500 Power List" of influencers in the UK’s technology sector.