The Anatomy of a Breach & Thwarting the Insider Threat
In today’s post-Snowden operating environment, thwarting the next “Insider Threat” has been designated as a strategic imperative by policymakers. Down at the operational and tactical levels, cybersecurity practitioners already know how to effectively secure, harden, and audit IT systems and are already doing so with professionalism and dedication. However, developing an effective data loss prevention strategy for the enterprise involves significantly more complex challenges than locking down network infrastructure. It requires a more holistic analysis of where sensitive data resides and how it is stored, accessed, and transferred by those already holding the requisite clearances and operational need to know.
View our complimentary on-demand webcast as we cover the anatomy of a breach through each of its stages how to develop a robust, defense in depth data loss prevention strategy that can best secure massive data volumes regardless of where such data is stored or used. During this time we'll cover:
- Use cases, including scenarios where there is a need to identify the data owners of exposed files and folders; how best to alert security teams to anomalous activity or outlier user behaviors; and how to facilitate secure cyber collaboration with visualization and analytics.
- The touchy subject of identifying what rights that system admins have versus what rights that they individually need and how best to de-escalate excessive privileges will also be explained
- Best practices to improve data spill incident response and remediation will be presented
Event Type
Webcast
This event has no exhibitor/sponsor opportunities
When
Tue, Apr 21, 2015, 2:00pm - 3:00pm
ET
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Event Sponsors
Organizer
Symantec Government Team at Carahsoft