Rob Sobers, a Director at Varonis Systems, Inc. to speak at KC’s Event

 
NEW YORK - July 23, 2015 - PRLog -- The Knowledge Group/The Knowledge Congress Live Webcast Series, the leading producer of regulatory focused webcasts, has announced today that Rob Sobers, Director, Varonis Systems, Inc.will speak at the Knowledge Congress’ webcast entitled “Cyber Security: Tackling The Threat From Within in 2015 and Beyond LIVE Webcast.” This event is scheduled for August 5, 2015 @ 10:00 am – 12:00 pm (ET).

For further details, please visit:


http://theknowledgegroup.org/event_name/cyber-security-tackling-the-threat-from-within-in-2015-and-beyond-live-webcast/

About Rob Sobers

Rob Sobers, a Director at Varonis. He has been writing and designing software for over 20 years and is co-author of the book Learn Ruby the Hard Way, which has been used by thousands of students to learn the Ruby programming language. He is a 12-year technology industry veteran and prior to joining Varonis, held positions in software engineering, design and professional services.

About Varonis Systems

Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and migrate their unstructured, human-generated data. This type of unstructured data includes an enterprise’s spreadsheets, word processing documents, presentations, audio files, video files, emails, text messages and any other data created by employees.

Event Synopsis:

Traditionally, most cyber security threats are viewed as being external. However, misguided, unscrupulous, or disgruntled employees, contractors, partners, co-operators, and past employees can pose a significant threat of cyber security breach within an organization because they are allowed access within the system. The threat of fraud posed by employees and other authorized users affect the public and commercial sectors, and places personal information, data, and intellectual property at risk.  Much of the risk today is from younger people and often relates to procurement fraud.

IT security should also be asking: how do you tell the difference between an employee and an outsider who has taken over an employee’s credentials? File accesses by outsiders pretending to be insiders — directory searches, files and emails read, and files copied — can be difficult to spot without automated analysis, and even harder to spot if you’re not monitoring user/data activity at all.

A great deal of activity on company networks is unmonitored, there is a huge amount of data that grows larger and larger, and many fraudsters are intelligent. In addition, internal breaches often are subtle and complex. They can be harder to detect because they may occur over a long period of time and be confounded by the complexity of computer networks; especially of financial institutions. Many organizations are vulnerable to the increasing threats to intellectual property and data because they tend to be unaware of the risk for months or even years.

One answer is to look at behavioral patterns — detailed file and email access patterns of each user.  User Behavior Analytics (UBA) emphasizes security on the inside – identifying what a user is doing compared to his/her normal activity.

Dealing effectively with insider threats requires sufficient review of prospective employees and co-operators, education, monitoring of networks, sound security policies and procedures, strong  enforcement, analytics, and good cyber security governance policies. With such procedures and systems in place, prevention, detection, and recovery from cyber security incidents is easier.

In a two hour, LIVE webcast, a panel of distinguished professionals and leaders assembled by The Knowledge Group will discuss the nuances of Cyber Security when tackling the threat from within in 2015 and beyond.  The panel of speakers will provide insight into methods for prevention, detection, and mitigation of the consequences of internal cyber security breaches.

In a two-hour LIVE Webcast, the speakers will discuss:

·         Cyber Security and Insider Threats – An Overview

·         Commercial and Public Sectors Vulnerability

·         Insider Threat Profiling & Other Security Strategies

·         Protecting Network Systems

·         Protecting Data & Intellectual Property

·         Effective Cyber Security Governance Policies and Procedures

·         Sanctions and Liabilities

·         Regulatory Updates

·         Compliance and Litigation Risks

About The Knowledge Group, LLC/The Knowledge Congress Live Webcast Series

The Knowledge Congress was established with the mission to produce unbiased, objective, and educational live webinars that examine industry trends and regulatory changes from a variety of different perspectives. The goal is to deliver a unique multilevel analysis of an important issue affecting business in a highly focused format. To contact or register to an event, please visit: www.knowledgecongress.org

Contact
The Knowledge Group
***@theknowledgegroup.org
End
Source: » Follow
Email:***@theknowledgegroup.org
Tags:Rob Sobers, Cyber Security, Varonis Systems, Inc
Industry:Event, Legal
Location:New York City - New York - United States
Subject:Events
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse
The Knowledge Group PRs
Trending News
Most Viewed
Top Daily News



Like PRLog?
9K2K1K
Click to Share