Insider Threat

Discover the latest collection of talks and videos on Insider Threat from industry experts.

Recent talks on Insider Threat

Navigating Insider Risks in a AI-Driven World
Channel Logo

Navigating Insider Risks in a AI-Driven World

This presentation explored the evolving threat landscape of insider threats in the age of AI, highlighting how the advancements in technology amplify insider
risks. Key takeaways included: - How insider threats are evolving in the age of AI - How AI has amplified risks but also strengthened defences - How to adopt
proactive strategies

Fueling AI-Enabled Security in the Public Sector
Channel Logo

Fueling AI-Enabled Security in the Public Sector

This webcast, featuring specialists from Deloitte and Palo Alto Networks, addresses the integration of AI in cybersecurity for government organizations. It
highlights pressing challenges such as data overload, complex ecosystems, and resource constraints, and explores how AI can enhance threat detection,
automate technical tasks, and improve incident response. The discussion covers the concerns hindering AI deployment, including data quality and integrity, …

Defending Against Insider Threats with a Behaviour-Based Approach
Channel Logo

Defending Against Insider Threats with a Behaviour-Based Approach

In this webinar, we addressed the growing cybersecurity risk posed by insider threats and discussed how organisations can protect themselves using a
behaviour-based, AI-powered approach. Insider threats can come from employees, contractors, or business partners who intentionally or unintentionally
misuse their access to sensitive data and systems. These threats are particularly challenging to detect because they involve valid credentials and often occ…

AIを活用した内部不正監視の自動化と事例 (Automated Insider Threat Monitoring Using AI and Case Studies)
Channel Logo

AIを活用した内部不正監視の自動化と事例 (Automated Insider Threat Monitoring Using AI and Case Studies)

内部不正と一言でいっても様々な種類の不正が存在します。本講演では実際に起きた内部不正の事例を交えながら、どのような対策ができるのかをご紹介します。また、AIと機械学習を取り入れることで、脅威の検知、調査、対応の自動化を実現する方法を解説していきます。

Sandworm’s Cyber Espionage: Russia’s GRU-Linked APT Uses Pirated Software in Ukraine
Channel Logo

Sandworm’s Cyber Espionage: Russia’s GRU-Linked APT Uses Pirated Software in Ukraine

Are your security defenses ready to counter the latest nation-state attack techniques? Since late 2023, Russia's elite Sandworm (APT44) team has been
executing a sophisticated cyber espionage campaign with devastating effectiveness. By strategically trojanizing Microsoft KMS activation tools and disguising
malware as Windows updates, they've created an extensive foothold across Ukrainian government, critical infrastructure, and business networks. On 25 M…

From Zero to CK(A)(S) Hero: Insider Tips & K8s Certification Exam Strategies - Live Q&A - CNCF Ambassador Saiyam Pathak
Channel Logo

From Zero to CK(A)(S) Hero: Insider Tips & K8s Certification Exam Strategies - Live Q&A - CNCF
Ambassador Saiyam Pathak

From Zero to CK(A)(S) Hero: Insider Tips & K8s Certification Exam Strategies - Live Q&A - CNCF Ambassador Saiyam Pathak

Revealing the Missing Link: Complete Exposure Assessment with Hive Pro’s CAASM
Channel Logo

Revealing the Missing Link: Complete Exposure Assessment with Hive Pro’s CAASM

What if your threat exposure management platform could do it all—from asset visibility to complete exposure assessment and validation—all in one place?
Join us for an exclusive first look at Hive Pro’s new Cyber Asset Attack Surface Management (CAASM) solution, now an integral part of our Uni5 Xposure
platform. This is more than just another CAASM tool—it’s the key to achieving a complete threat exposure management strategy through native exposure a…

Defending Against Famous Chollima
Channel Logo

Defending Against Famous Chollima

Cybercriminals have reached new levels of sophistication. Are you prepared? Cybercriminals are getting smarter, and insider threats are becoming more
difficult to detect. FAMOUS CHOLLIMA has taken advantage of remote access to impact organizations across financial services. In this virtual briefing, hear
how our hunting capabilities have advanced and practical ways you can protect your organization. What you’ll learn: - Understand the rise of Famous Choll…

Attend Summits on Insider Threat

Successfully Securing Endpoints & Mitigating Threats

Successfully Securing Endpoints & Mitigating Threats

Achieving endpoint visibility to ward off the threat of a breach has never been more important than it is in the age of data proliferation and hybrid
workplaces. Multiple endpoints and locations heighten that risk, making it essential for CISOs and IT security teams to overcome common challenges. Find o…

|19 sessions
Cyber Threats and Breach Protection

Cyber Threats and Breach Protection

Cybersecurity Ventures expects global cybercrime to reach $10.5 by 2025 - up from $3 trillion in 2015. With this staggering growth putting businesses of all
sizes at risk, it’s essential that organizations understand the latest threats and trends defining the 2022 threatscape. Join key industry professionals and lead…

|22 sessions
Enabling Effective Threat Detection and Response

Enabling Effective Threat Detection and Response

The current threat landscape is a vast one, demanding companies detect and respond to increasingly sophisticated attacks holding potential to cause
significant damage. With the proliferation of artificial intelligence (AI) and machine learning use, experts are concerned threat actors will weaponize this gr…

|12 sessions
The 2023 Threatscape

The 2023 Threatscape

2023 will see organizations battle a more complex threatscape than ever before, with web application breaches continuing to rise, credential theft and
credential stuffing remaining a concern, and ransomware demands hitting the big players. As a result, it’s no wonder that CISOs and security practitioners a…

|37 sessions
BrightTALK @ Infosecurity Europe 2022

BrightTALK @ Infosecurity Europe 2022

With over 19,000 attendees, Infosecurity Europe is the biggest security conference in Europe. Tune in with other IT and Cyber Security professionals
discussing the challenges facing organisations in the current threatscape.

|6 sessions
CISO Strategies (APAC Edition)

CISO Strategies (APAC Edition)

With the rise in breaches and cyber crime, organizations around the world face an increased risk of loss, not only to their financial bottom line, but also in
damages to their reputation and customer satisfaction. Discover how CISOs are continually building and implementing their security strategy, and the tools …

|12 sessions

Watch series about Insider Threat

Thought Leadership Thursday
37 episodes
Series Company Logo

Thought Leadership Thursday

Designed to provide valuable knowledge and actionable guidance, Adlumin’s Thought Leadership Thursday webinar series explores a wide range of
cybersecurity topics, including threat hunting, incident response, insider threat detection, compliance, and more. Each session features a renowned expert …

Watch series

Threat Report Serie
32 episodes
Series Company Logo

Threat Report Serie

In-depth analysis of real-world, extensive cyber threat data gathered by the SonicWall Capture Labs threat researchers every year. The SonicWall Cyber
Threat Report provides critical insights, actionable intelligence, and trend analysis and changes in cybercriminal tactics needed to safeguard your organizati…

Watch series

Beyond the Login: Security First IAM
19 episodes
Series Company Logo

Beyond the Login: Security First IAM

Don’t just manage identities. Secure them. Learn about strategies and solutions that support a security first approach to IAM, providing the right users
seamless access to the right resources at the right time, while safeguarding credentials and controlling access to privileges in on-premises and cloud-based…

Watch series

Adlumin Insights: Threat Research
3 episodes
Series Company Logo

Adlumin Insights: Threat Research

In this comprehensive series, our Threat Research Team and panel of cybersecurity experts will provide valuable insights into the world of threat detection
and threat hunting. We will explore the latest methodologies, tools, and techniques used to identify and respond to various types of threats, including advan…

Watch series

Mimecast Cyber Threat Intelligence Series | APAC
5 episodes
Series Company Logo

Mimecast Cyber Threat Intelligence Series | APAC

Across the globe and especially in the APAC region, we have been seeing an increased amount of threats from malicious actors exploiting and creating
confusion & fear surrounding employees. Our threat intelligence team has been monitoring the evolving threats and taking protective action. The Threat In…

Watch series

Best of Fal.Con 2024
8 episodes
Series Company Logo

Best of Fal.Con 2024

More than 6,000 cybersecurity experts attended CrowdStrike’s Fal.Con 2024. If you weren’t one of them and want to know what you missed – or if you were
there and want a recap – this series highlights big moments from the 4-day, insight-packed event.

Watch series