Follow on Google News News By Tag Industry News News By Place Country(s) Industry News
Follow on Google News | Rob Sobers, a Director at Varonis Systems, Inc. to speak at KC’s EventFor further details, please visit: http://theknowledgegroup.org/ About Rob Sobers Rob Sobers, a Director at Varonis. He has been writing and designing software for over 20 years and is co-author of the book Learn Ruby the Hard Way, which has been used by thousands of students to learn the Ruby programming language. He is a 12-year technology industry veteran and prior to joining Varonis, held positions in software engineering, design and professional services. About Varonis Systems Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and migrate their unstructured, human-generated data. This type of unstructured data includes an enterprise’s spreadsheets, word processing documents, presentations, audio files, video files, emails, text messages and any other data created by employees. Event Synopsis: Traditionally, most cyber security threats are viewed as being external. However, misguided, unscrupulous, or disgruntled employees, contractors, partners, co-operators, and past employees can pose a significant threat of cyber security breach within an organization because they are allowed access within the system. The threat of fraud posed by employees and other authorized users affect the public and commercial sectors, and places personal information, data, and intellectual property at risk. Much of the risk today is from younger people and often relates to procurement fraud. IT security should also be asking: how do you tell the difference between an employee and an outsider who has taken over an employee’s credentials? A great deal of activity on company networks is unmonitored, there is a huge amount of data that grows larger and larger, and many fraudsters are intelligent. In addition, internal breaches often are subtle and complex. They can be harder to detect because they may occur over a long period of time and be confounded by the complexity of computer networks; especially of financial institutions. Many organizations are vulnerable to the increasing threats to intellectual property and data because they tend to be unaware of the risk for months or even years. One answer is to look at behavioral patterns — detailed file and email access patterns of each user. User Behavior Analytics (UBA) emphasizes security on the inside – identifying what a user is doing compared to his/her normal activity. Dealing effectively with insider threats requires sufficient review of prospective employees and co-operators, education, monitoring of networks, sound security policies and procedures, strong enforcement, analytics, and good cyber security governance policies. With such procedures and systems in place, prevention, detection, and recovery from cyber security incidents is easier. In a two hour, LIVE webcast, a panel of distinguished professionals and leaders assembled by The Knowledge Group will discuss the nuances of Cyber Security when tackling the threat from within in 2015 and beyond. The panel of speakers will provide insight into methods for prevention, detection, and mitigation of the consequences of internal cyber security breaches. In a two-hour LIVE Webcast, the speakers will discuss: · Cyber Security and Insider Threats – An Overview · Commercial and Public Sectors Vulnerability · Insider Threat Profiling & Other Security Strategies · Protecting Network Systems · Protecting Data & Intellectual Property · Effective Cyber Security Governance Policies and Procedures · Sanctions and Liabilities · Regulatory Updates · Compliance and Litigation Risks About The Knowledge Group, LLC/The Knowledge Congress Live Webcast Series The Knowledge Congress was established with the mission to produce unbiased, objective, and educational live webinars that examine industry trends and regulatory changes from a variety of different perspectives. The goal is to deliver a unique multilevel analysis of an important issue affecting business in a highly focused format. To contact or register to an event, please visit: www.knowledgecongress.org End
Account Email Address Account Phone Number Disclaimer Report Abuse
|
|