WEBINAR

Inside Out: Mastering the Art of Insider Threat Detection

On-Demand

Insider Threats are best defined by CISA: “Insider threat incidents are possible in any sector or organization. An insider threat is typically a current or former employee, third-party contractor, or business partner. In their present or former role, the person has or had access to an organization’s network systems, data, or premises, and uses their access (sometimes unwittingly). To combat the insider threat, organizations can implement a proactive, prevention-focused mitigation program to detect and identify threats, assess risk, and manage that risk - before an incident occurs.”

Insider threats — whether intentional or not — can cause severe and costly damage to an organization. They can lead to:

  • Loss of sensitive data. Insiders with access to critical data could leak or steal it, leading to significant financial and reputational damage.
  • Financial consequences. Data breaches caused by insider threats can result in costly legal fees, regulatory fines, and settlements.
  • Damage to reputation. Insider incidents can cause irreparable damage to the organization's reputation and take a long time to regain the trust of customers and shareholders.
  • Disruption to business operations. Insider threats can lead to business disruption, resulting in lost productivity and revenue.
  • Legal and regulatory consequences. Organizations can face legal action from individuals or regulatory penalties for failing to protect sensitive data.

Lorem ipsum dolor sit amet

Time Place Details
10:00am - 10:55am Expo Hall Meet and greet in the lobby outside the Expo Hall before the General Assembly.
11:00am - 11:55am Rm 314 Expert Track: TOP 10 WAYS TO MAKE A DIFFERENCE IN THE INDUSTRY | John Dough, CFO Marketizingly
11:00am - 11:55am Rm 159 Social Track: MODERN NETWORKING | Hosted by: SponsorName

Lorem ipsum dolor sit amet

Pellentesque non magna eget ex lobortis finibus. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Etiam nec arcu non eros hendrerit viverra a vitae libero. Etiam et ultricies nulla. Donec euismod lectus magna, eu dignissim mauris hendrerit vulputate.

Join Splunk Industry and Security experts Harry Chichadjian and Nathan Smith who share their thoughts on how to stay one step ahead of Insider Threat. During this session you will gain a greater insight into the types of insider threat, the consequences of not having an insider threat program, how to identify potential insiders and mitigate the risk to your business.

Learn more:

  • Scope and Take Action - Identify the impact and scale of Insider Threat, understand your options of how to better protect your organisation.
  • With Splunk, customers can use and extend the capabilities of Enterprise Security, Risk Based Alerting and incorporate User Behavior Analytics to increase the likelihood of finding insider threat behavior before it impacts your business.
  • Splunk UBA uses machine learning capabilities to help organisations find hidden threats and anomalous behavior across users, devices and applications
  • Splunk UBA detects insider threats using out-of-the-box use cases that use unsupervised machine learning algorithms.
  • Splunk User Behavior Analytics focuses on two main use cases: detecting malicious insiders and identifying advanced cyber attacks happening inside the environment.
  • Recommendations and key takeaways

Our Speakers

Harry Chichadjian

Financial Services Industry Advisor - APAC

Splunk

Nathan Smith

Head of Security - APAC

Splunk