Recent talks on Insider Threat


Navigating Insider Risks in a AI-Driven World
This presentation explored the evolving threat landscape of insider threats in the age of AI, highlighting how the advancements in technology amplify insider
risks. Key takeaways included: - How insider threats are evolving in the age of AI - How AI has amplified risks but also strengthened defences - How to adopt
proactive strategies


Fueling AI-Enabled Security in the Public Sector
This webcast, featuring specialists from Deloitte and Palo Alto Networks, addresses the integration of AI in cybersecurity for government organizations. It
highlights pressing challenges such as data overload, complex ecosystems, and resource constraints, and explores how AI can enhance threat detection,
automate technical tasks, and improve incident response. The discussion covers the concerns hindering AI deployment, including data quality and integrity, …


Defending Against Insider Threats with a Behaviour-Based Approach
In this webinar, we addressed the growing cybersecurity risk posed by insider threats and discussed how organisations can protect themselves using a
behaviour-based, AI-powered approach. Insider threats can come from employees, contractors, or business partners who intentionally or unintentionally
misuse their access to sensitive data and systems. These threats are particularly challenging to detect because they involve valid credentials and often occ…


Sandworm’s Cyber Espionage: Russia’s GRU-Linked APT Uses Pirated Software in Ukraine
Are your security defenses ready to counter the latest nation-state attack techniques? Since late 2023, Russia's elite Sandworm (APT44) team has been
executing a sophisticated cyber espionage campaign with devastating effectiveness. By strategically trojanizing Microsoft KMS activation tools and disguising
malware as Windows updates, they've created an extensive foothold across Ukrainian government, critical infrastructure, and business networks. On 25 M…


Revealing the Missing Link: Complete Exposure Assessment with Hive Pro’s CAASM
What if your threat exposure management platform could do it all—from asset visibility to complete exposure assessment and validation—all in one place?
Join us for an exclusive first look at Hive Pro’s new Cyber Asset Attack Surface Management (CAASM) solution, now an integral part of our Uni5 Xposure
platform. This is more than just another CAASM tool—it’s the key to achieving a complete threat exposure management strategy through native exposure a…


Defending Against Famous Chollima
Cybercriminals have reached new levels of sophistication. Are you prepared? Cybercriminals are getting smarter, and insider threats are becoming more
difficult to detect. FAMOUS CHOLLIMA has taken advantage of remote access to impact organizations across financial services. In this virtual briefing, hear
how our hunting capabilities have advanced and practical ways you can protect your organization. What you’ll learn: - Understand the rise of Famous Choll…
Attend Summits on Insider Threat
Successfully Securing Endpoints & Mitigating Threats
Achieving endpoint visibility to ward off the threat of a breach has never been more important than it is in the age of data proliferation and hybrid
workplaces. Multiple endpoints and locations heighten that risk, making it essential for CISOs and IT security teams to overcome common challenges. Find o…
Cyber Threats and Breach Protection
Cybersecurity Ventures expects global cybercrime to reach $10.5 by 2025 - up from $3 trillion in 2015. With this staggering growth putting businesses of all
sizes at risk, it’s essential that organizations understand the latest threats and trends defining the 2022 threatscape. Join key industry professionals and lead…
Enabling Effective Threat Detection and Response
The current threat landscape is a vast one, demanding companies detect and respond to increasingly sophisticated attacks holding potential to cause
significant damage. With the proliferation of artificial intelligence (AI) and machine learning use, experts are concerned threat actors will weaponize this gr…
The 2023 Threatscape
2023 will see organizations battle a more complex threatscape than ever before, with web application breaches continuing to rise, credential theft and
credential stuffing remaining a concern, and ransomware demands hitting the big players. As a result, it’s no wonder that CISOs and security practitioners a…
BrightTALK @ Infosecurity Europe 2022
With over 19,000 attendees, Infosecurity Europe is the biggest security conference in Europe. Tune in with other IT and Cyber Security professionals
discussing the challenges facing organisations in the current threatscape.
CISO Strategies (APAC Edition)
With the rise in breaches and cyber crime, organizations around the world face an increased risk of loss, not only to their financial bottom line, but also in
damages to their reputation and customer satisfaction. Discover how CISOs are continually building and implementing their security strategy, and the tools …
Watch series about Insider Threat

Thought Leadership Thursday
Designed to provide valuable knowledge and actionable guidance, Adlumin’s Thought Leadership Thursday webinar series explores a wide range of
cybersecurity topics, including threat hunting, incident response, insider threat detection, compliance, and more. Each session features a renowned expert …

Threat Report Serie
In-depth analysis of real-world, extensive cyber threat data gathered by the SonicWall Capture Labs threat researchers every year. The SonicWall Cyber
Threat Report provides critical insights, actionable intelligence, and trend analysis and changes in cybercriminal tactics needed to safeguard your organizati…

Beyond the Login: Security First IAM
Don’t just manage identities. Secure them. Learn about strategies and solutions that support a security first approach to IAM, providing the right users
seamless access to the right resources at the right time, while safeguarding credentials and controlling access to privileges in on-premises and cloud-based…

Adlumin Insights: Threat Research
In this comprehensive series, our Threat Research Team and panel of cybersecurity experts will provide valuable insights into the world of threat detection
and threat hunting. We will explore the latest methodologies, tools, and techniques used to identify and respond to various types of threats, including advan…

Mimecast Cyber Threat Intelligence Series | APAC
Across the globe and especially in the APAC region, we have been seeing an increased amount of threats from malicious actors exploiting and creating
confusion & fear surrounding employees. Our threat intelligence team has been monitoring the evolving threats and taking protective action. The Threat In…

Best of Fal.Con 2024
More than 6,000 cybersecurity experts attended CrowdStrike’s Fal.Con 2024. If you weren’t one of them and want to know what you missed – or if you were
there and want a recap – this series highlights big moments from the 4-day, insight-packed event.