FREE WEBINAR

Insider threats in 2020: Best practices for detection and protection

  • January 22 at 2 PM AEDT | 2 PM GST ( 10 AM GMT )
  • 45 Mins

  • January 23 at 2 PM EST
  • 45 Mins

Presented by

Ram,Product Expert

About this webinar

Insider threats are arguably more dangerous than external hacks. While external hackers need to get through peripheral network devices, malicious insiders already reside within the network. Further, insiders know just where sensitive data resides. Building effective frameworks for detecting insider threats remains an open challenge. In this webinar, we'll attempt to build a structured approach for insider threat detection in the year 2020 and beyond.

Agenda

  • The clear and present dangers of insider threats.
  • The attacker psyche: What motivates insiders to attack?
  • Why is insider threat detection difficult?
  • You're under attack! How to detect before it's too late.
  • Learning from the attack and becoming more secure.
  • 2Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 3Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 4Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.

Watch Now

  • Please enter a business email id
  •  
  • By clicking 'Play now', you agree to processing of personal data according to the Privacy Policy.

© 2019 Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now