Insider threats and attacks Detection and prevention

Streaming video - 2014

Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization to recover from. In this report Jason Mical, Director of Network Forensics at AccessData, offers advice and best practices to help organizations reduce the risk of a successful insider attack on enterprise data, systems and networks. Track: Technical briefings in-depth information on new techn...ologies, techniques and solution providers. Learning objectives: Understand the nature of an insider-attack and the profile of a typical attacker. Discuss insider-attack methods and the systems and applications that may be particularly vulnerable to malicious attacks. Explain ways organizations can reduce the risk of an insider attack.

Saved in:
Subjects
Published
[San Francisco, California, USA] : Kanopy Streaming 2014.
Language
English
Corporate Author
Kanopy (Firm)
Corporate Author
Kanopy (Firm) (-)
Online Access
A Kanopy streaming video
Cover Image
Item Description
Title from title frames.
Physical Description
1 online resource (1 video file, approximately 21 min.) : digital, .flv file, sound
Format
Mode of access: World Wide Web.
Access
AVAILABLE FOR USE ONLY BY IOWA CITY AND RESIDENTS OF THE CONTRACTING GOVERNMENTS OF JOHNSON COUNTY, UNIVERSITY HEIGHTS, HILLS, AND LONE TREE (IA).