The Insider Threat: Real Defense for Real Businesses

Insider data leaks, whether malicious or accidental, can be caused by anyone: the extra-helpful customer service rep, the highly privileged IT admin or the jet-setting CFO. How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place?

In this webinar, learn how cybersecurity professionals can address the insider threat without shutting down business.

Available:
On Demand
Duration:
1h 00min

Attend this webinar and you’ll learn:

  • What essentials must be in your end user awareness program and how to make those lessons stick
  • Which tools and techniques can be used to enforce security policies when your users unintentionally or maliciously try to break them
  • How you can spot the signs of an impending or ongoing insider data leak and respond

Featured Speakers

  • Katie Burnell
    Katie Burnell
    Global Insider Threat Specialist
    Dtex Systems

    When Katie Burnell went to work for the Bank of England as a data processor, she didn't intend to switch career paths into cybersecurity. She was on the digital media team when she learned the bank was creating an IT security department. As she moved up through the ranks, Burnell helped build the bank's first security operations center and insider threat capability, eventually landing a role as cyber investigator.
    Now she works as a Global Insider Threat Specialist at Dtex, where she analyzes user activity, conducts threat assessments, and communicates security risks to a pool of clients that includes large global financial institutions, power suppliers, and government agencies.
    As an expert threat specialist, Burnell splits her time between US-based large financial institutions and Dtex's EMEA customer base. She also fulfills a role in the EMEA pre-sales strategy, meeting with prospective customers, providing strategic consultations, and representing Dtex at partner events. On top of that, Burnell helps develop the "Dtex Insider Threat Intelligence Report" and works with other teams to advance Dtex technology and expertise in detecting insider threats. Her time with the Bank of England helped establish her skills in detecting insider threats, she says, and her interest and qualifications in open source intelligence (OSINT) helped grow them.
    Burnell says her experience as a young woman in cybersecurity has been challenging, but that hasn't stopped her from sharing her experience and knowledge. She has spoken at industry events in the past, and one of her career goals is to present at Black Hat, which she first attended in 2016 and was inspired by the speakers' knowledge and variety of presentation styles and topic areas.
    Burnell's overarching goal is to continue sharing her knowledge and hands-on experience "of the often ugly truths, unspoken trends, and 'real' issues that companies face, and to make this relatable to businesses of all sizes, industries, budgets, and cybersecurity maturity levels," she says.
    Burnell is a qualified OSINT practitioner, certified "human hacker," Maltego CTF champion, and advocate for women in cybersecurity.

  • Kurt Wescoe
    Kurt Wescoe
    Chief Architect
    Wombat Security

    As Chief Architect at Wombat Security, a division of Proofpoint, Kurt Wescoe draws on his understanding of education techniques, curriculum design, learning science principles, and computer science to ensure that Wombat's software, systems, and training tools are built on a sound foundation. He also specializes in data analysis, evaluating Wombat’s wealth of security data to better understand and reduce end-user risk. In addition to his work with Wombat, Kurt previously served as a faculty member at Carnegie Mellon University in the School of Computer Science’s master’s program in e-Business. Kurt earned his MS in e-Commerce from CMU, and a BS in Computer Engineering from the University of Pittsburgh. He regularly presents at events and webinars organized by leading cybersecurity organizations, including ISSA, SecureWorld, and Information Security Forum.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By