Insider Risk: How to Keep Your Data Safe in a Hybrid Working World
In this Infosecurity Magazine webinar, Veriato's Ray Diwakar, CPTO, and David Morrow, CMO, join a panel of cybersecurity experts to discuss how organizations can manage insider risk in today's hybrid work environment. view now
Browse by category
Select a category to see more related content
The Human Centric Approach to Data Loss Prevention
In today’s work-from-anywhere organization, a data loss prevention (DLP) strategy is more essential than ever. Learn how to build a robust human centric approach to data loss prevention.
View NowStrengthening Your Insider Risk Program
In this webinar, Dr. Christine Izuakor discusses some of the top insider risk trends and how to strengthen your system in advance.
View NowInsider Risk Looms the Manufacturing Industry
Insider security breaches in manufacturing are now an impending reality requiring companies to safeguard themselves. This webinar dives deeper into the dynamics and challenges leading to the rise of insider incidents in manufacturing and ways to mitigate those.
View NowManaging Insider Risk vs. Insider Threats
Learn the difference between insider risk and insider threat and how to shift your processes to focus on managing insider risk.
View NowInsider Risk in Healthcare and Tips to Mitigate
Insiders were responsible for the majority of data breaches in the healthcare industry. In this webinar you will learn how to mitigate those risks.
View NowMitigating Insider Risk in Manufacturing
Learn how to secure high-risk data handling via user activity monitoring of every person in the manufacturing supply chain that accesses IP.
View NowCombating Insider Threats in Remote Learning Environments
Cybersecurity attacks targeting academic institutions are rising exponentially. In this webinar, we discuss ways to manage the insider risk for your organization.
View NowLeveraging National Cybersecurity Awareness Month to Reduce Insider Threats
Leverage the National Cybersecurity Awareness Month to raise awareness of insider risk to sensitive data in your organization.
View NowHow Insider Threats Impacts the Financial Sector
See how insider risk can be managed and mitigated within the financial sector, which today is a prime target of cybercriminals.
View NowCombating Social Engineering Threats Through Insider Threat Management
Social engineering is an insidious way of getting "insider access" into an organization's network and data. Learn how to identify and prevent social engineering with a robust insider threat management program.
View NowInsider Risk in the Healthcare Sector
Dr. Christine Izuakor & Veriato examine the insider threat landscape in healthcare. Learn what your organization can do to manage insider risk.
View NowManaging The New Insider Risk in the Education Sector & Beyond
Join Dr. Christine Izuakor as she discusses recent trends and impacts of security failures in modern education environment.
View NowHow to Adjust Your Insider Threat Program in Today’s World: Social Engineering Edition
Learn to understand insider threat motivations and actions and recognize those risks ahead of time in this discussion with Dr. Christine Izuakor.
View NowCyber Security Awareness Month1
In honor of NCSAM, we’re having a conversation around how to manage cyber risk through a user centric approach to threat detection.
View NowImplementing An Insider Threat Mitigation Framework – Critical Elements For Detecting & Mitigating Insider Threats
Learn about the critical elements for implementing an insider threat mitigation framework and what organizational factors can contribute to insider threats.
View NowNew Trends With Ransomware – Fall 2021
Join us as we discuss how a people-centric approach to fighting back against ransomware attacks is one of the best ways to combat this growing plague to businesses.
View NowThe Impact of Ransom Attacks on Supply Chains: Addressing 3rd Party Risk
In the past few years, ransomware attacks have rapidly evolved in sophistry and impact. That trend is now gaining new dimensions by targeting the supply chain.
View NowRansom Attacks in the Supply Chain: Securing Your Downstream Data
Learn about the recent evolution of the supple chain risk. We discuss how to manage third-party risks, automate threat vigilance to mitigate security blind spots and create business continuity plans.
View NowThe Current of Ransomware
The rising ransomware trend has made it imperative for CISOs and IT security leaders to evaluate and defend their organizations against this ominous threat.
View NowRansomware Has Evolved, And So Should Your Company
As ransomware attacks grow and evolve, how can companies arm themselves with the right solutions to defend from these ever-growing attacks? Join Dr. Christine Izuakor and Jay Godse, Head of Product at Veriato as they discuss this important topic.
View NowLearning From The Most Concerning Breaches Of 2021 So far
Join Dr. Christine Izuakor as she covers what we can learn from the most concerning breaches of 2021 thus far.
View NowNavigating Cybersecurity Tool Fatigue
With so many new vendors pitching "Insider Threat Detection", how do you separate marketing fluff from reality? Join us in our latest episode as we discuss selecting the right tool for your unique business needs.
View NowHow Insider Threats and the Dark Web Increase Remote Work Risk
In our latest podcast, we take a deep dive into the gloomiest part of the internet, the “Dark Web” as we try to demystify everything we think we know. This is the realm of internet land where criminals and offenders can be found lurking around every corner. Though there is some truth to this perception, there are also many misconceptions about the Dark Web and its role in the security or insecurity of businesses. Join Dr. Christine Izuakor and a special guest from Equifax, Dr. Michael Owens as we unravel the Dark Web.
View NowRevisiting 5 Concerning Cyber Trends And Statistics Over The Past Year
In our latest podcast, we discuss 5 of the most concerning trends and statistics over the past year. Join Dr. Christine Izuakor and Frank McGovern, Cybersecurity Architect, as they discuss various cybersecurity topics such as the rise of internal threat actors, security and awareness training, and addressing the human element.
View NowChallenges Of Selecting An Insider Threat Detection Tool
In a crowded market with so many new products being released, it can often be hard to make sure you're getting right the tool for your business needs. Purchasing an Insider Threat Detection tool for your organization requires extensive research, which can be very time-consuming. Learn how to make the right choice.
View NowUtilizing Employee Monitoring Software For Operational Efficiency And Data Security
Join us in our latest episode hosted by Dr. Christine Izuakor and Anthony Lauderdale, Head of Cyber Defense at Zoom, as we discuss the evolution of Employee Monitoring Software, and how the technology can be utilized to increase operational efficiency in the new remote world. We also discuss Insider Threat Detection and how employees could be influenced by financial data to exfiltrate intellectual property.
View NowWhat Do Your Remote Employees Do All Day?
Remote workforce presents organizations with a unique set of challenges when it comes to employee productivity, security and regulatory compliance. Learn how an employee monitoring software can help in all those areas.
View NowManaging The Compliance & Security Nightmares Caused By A Remote Workforce
Find out how to maintain compliance with remote workforce and learn strategies to keep your organization's crucial data secure.
View Now5 Cybersecurity Priorities To Focus On In 2021
The 2020 pandemic resulted in significant challenges to health, wealth, business, and cybersecurity. The early part of the year saw a rapid movement to a remote workforce. Learn about key cybersecurity priorities you need to focus on for the rest of this year.
View NowExtending Cybersecurity Beyond The Office Perimeter
A typical company has various cybersecurity measures in place to make sure all data is secure while employees are at the office. But the Pandemic changed that so how have companies extended those same measures beyond the office into the home?
View NowManaging Security And Compliance In A Remote World
The COVID-19 pandemic has had serious repercussions on the global economy and has also forced millions to work remotely from their homes. But how do maintain compliance and security when your employees work from home?
View NowUser Behavior Analytics & The Zero Trust Approach
In this episode, we discuss the intersection of User And Behavior Analytics and a zero trust approach in a remote work environment.
View NowUsing AI To Detect And Prove Sticky HR Related Issues
Regardless of size, all companies will need to conduct an employee investigation in some shape or form. The key is having a reliable set of data to prove indisputable innocence or guilt. Join Cybersecurity expert, Dr. Christine Izuakor and Intelligence expert, Virgil Capollari as they discuss this topic in detail.
View NowManaging Compliance & Security In A Remote World
Join cybersecurity expert Christine Izuakor she discusses security remote devices, maintaining compliance and regaining visibility into your mobile workforce using user monitoring technology.
View NowMonitoring a Hybrid Workforce
A discussion on how technology distributors and resellers can help their clients get a better handle on their remote or hybrid workforce productivity, compliance and data security.
View NowThe New Norm In Cybersecurity
Companies will need to permanently account for securing remote workers whether they want to or not. This is the new norm. Join Christine Izuakor and Rolando Lopez as they discuss the measures companies are taking to fully ensure that their data is secure both in the office and at home!
View NowProductivity Concerns In The Age Of Remote Work
Join Cybersecurity expert, Christine Izuakor and Insider Threat expert, Stacey Champagne as they discuss productivity concerns in the age of remote work and offer potential technology and process solutions.
View NowLifting The Veil Of The Dark Web
See how companies arm themselves with the right tools to protect against threats from the dark web.
View NowUEBA And The Insider Threat
How can advancements in technology support security in the workplace? Join us as we discuss how AI and User Behavior Analytics can help with Insider Threats.
View NowCybersecurity Trends To Watch in 2020
Join Cybersecurity expert, Christine Izuakor and Becky Selzer from United Airlines as they discuss what cybersecurity trends to watch in 2020.
View NowMonitoring A Hybrid Workforce, The New Norm Webinar
Watch as we discuss how technology can help this transformation, providing insights and metrics for managing the new normal.
View NowOut of Sight, Still in Mind – Monitoring Remote Employees
We're witnessing the reopening of the world one industry at a time, but the narrative still hasn't changed. Employees are still working remotely and companies are trying to figure out how to efficiently manage remote employees. Join us as we discuss solutions employers are using to effectively monitor and manage their remote workforce.
View NowThe Impacts Of Insider Threats During COVID-19
The pandemic has caused hardship for many due to sudden layoffs and pay cuts, leaving the door open for numerous potential monetary opportunities through data theft or data exfiltration. This is real and it's a problem. Listen to our latest discussion with cybersecurity expert, Dr. Christine Izuakor and Insider Threat Expert, Leticia Lampkin from Google to learn more!
View NowRecent Fraud Trends Amidst The Ongoing Pandemic
Millions of people all over the world have been forced to work remotely due to the Covid-19 pandemic, and multiple industries have been disrupted in a way never seen on this scale before. Companies that succeed in this new world will be those leveraging fraud prevention software that provides advanced detection and prevention capabilities.
View NowPreventing Data Leakage When Employees Leave
Learn how to detect and stop the unauthorized transfer of data when employees leave your company.
View NowEffectively Managing The Shift To A Remote Workforce Webinar
Join cybersecurity expert, Dr. Christine Izuakor as she takes a look at the current pandemic, how previous pandemics have impacted cybersecurity and how COVID-19 has changed the nature of remote work.
View NowThe Evolution of Digital Forensics
Like a trail of evidence criminals may leave behind after committing a crime; almost every digital activity leaves virtual fingerprints.
View NowWhat Is NextGen Threat Hunting?
In this episode, we cover confessions of a cybersecurity threat hunter by talking to Jason Colyar, an cybersecurity industry expert with years of threat hunting experience.
View NowCombating Insider Threats During Tax Fraud Season
Digital fraud and theft are forms of cybercrime that involve creative attack tactics and deception. In this episode, we discuss how to protect yourself from digital fraud and data theft with a behavioral analytics and insider risk management program.
View NowReducing Cyber Risk With AI and User Behavior Analytics
Find out how user behavior analytics powered by machine learning can help your organization manage cyber and insider risk.
View NowFraud Prevention With User Behavior Analytics Webinar
Without deep visibility into user activity within an organization, suspicious behaviors that signal fraud may go unnoticed and insiders can profit by selling your sensitive data. In this webinar, we deep dive into fraud prevention with the help of user behavioral analytics.
View NowThe Rise of Ransomware As A Service (RAAS) Webinar
Join Nick Cavalancia from Techvangelism and Cyber Security Expert, Dr. Christine Izuakor as we discuss ransomware as a service (RAAS) and how this threat could be impacting your business.
View NowCounterforensics: How Insiders Evade Forensics
Sophisticated data theft and other covert malicious actions by insiders can involve covering their tracks with tools to erase data, hide data or even appear to be activities other than what actually occurred.
View NowUser Behavior Analytics and the Benefits to Companies
When insiders go "rogue" their behavior changes as they shift from simply performing their function to engaging in activities that harm your organization. User Behavior Analytics (UBA) software watches for signs of change that are directly related to insider threats, and alerts you as soon as meaningful anomalies are detected.
View NowMonitoring High Risk Positions – How UBA & UAM Help
Insiders – a company’s employees, vendors, and contractors – may pose a greater threat to cyber security than all outside malicious actors combined. The reason, of course, is quite simple: Insiders already have system authentication and access to any number of the company’s critical cyber assets.
View NowMitigating Employee Risk—Keep Hires from Starting Fires
The two times that employment risk is most evident is when hiring employees and when firing them… plus all the times in between. You, as an employer, are always at risk when dealing with employees from the time you hire them until the time they leave. Join us as we discuss tips for Pre-hire and Post-hire employee risk mitigation.
View NowMaster the Game of Who: Combating Insider Threats
Join Dr. Eric Cole as he leads a frank discussion with security experts Vince Berk and Mike Tierney about common insider threat scenarios, the phases of a malicious attack and how a combination of network behavior intelligence and user activity intelligence can give you the power to quickly detect, mitigate and defend against all types of insider attacks.
View NowInsider Threats and the Real Financial Impact to Organizations Webinar
Insider threats have become the Achilles' heel of most corporate security strategies that rely primarily on access management, network analysis or trying to lock down sensitive documents. Learn about what Insider threats are, and how to detect and prevent them.
View NowHow User Behavior Analytics Mitigates IP Theft By Employees
An introduction to the benefits of User Behavior Analytics in assessing employee behavior.
View Now3 Steps to Protect Your Data During The High Risk Exit Period
Learn how organizations can improve their security stance during the high risk exit period by taking a few steps that work to both protect against and prevent risky exit behavior.
View NowSpotting the Insider Threat: Knowing What to Look For
The greatest challenge in identifying a threat is knowing what actions to be watching and which of them constitute a potential threat. With benign and threatening insider activity looking so similar, it’s no wonder it takes months to identify data breaches or fraud.
View NowMonitoring Employees In A Remote Workplace
Watch as Insider Threat expert, Nick Cavalancia from Techvangelism discusses the challenges of gauging productivity and measuring results in remote workforce environment.
View NowImplementing a User Activity & Behavior Monitoring Program
This Webinar is intended to assist companies in determining how to best implement a user activity monitoring and / or user behavior analytics program.
View NowHow User Behavior Analytics Reduces Insider Threat
An introduction to the benefits of User Entity Behavior Analytics (UEBA) in assessing data leakage. UEBA can help you detect data breaches, sabotage, privilege abuse, and policy violations made by your own staff.
View NowHow to Leverage Technologies to Alert and Block Dark Web Access Webinar
So how do companies arm themselves with the right tools to protect themselves against rogue access to the Dark Web?
View NowHow Mature Is Your Insider Threat Program?
Join Insider Threat expert, Jim Henderson from Insider Threat Defense, Nick Cavalancia from Techvangelism and Cyber Security Expert, Patrick Knight as they discuss A Nonexistent Insider Threat Program.
View NowEffective Incident Response Through User Activity Monitoring
Join cyber security expert, Derek A. Smith (CISSP) and Nick Cavalancia from Techvangelism as they discuss responding to a data breach and other cybersecurity incidents more effectively with the help of user behavioral analytics.
View NowBuilding An Insider Threat Program
Developing and executing an Insider Threat Program that aligns with corporate values and data sources, brings about some unique challenges and concerns. Join Insider Threat expert, Jim Henderson from the Insider Threat Management Group and Nick Cavalancia from Techvangelism as they discuss best practices of establishing an insider threat program at your organization.
View Now5 Steps to Protect Your Organization Against the Ransomware Threat
Join security expert and founder of Techvangelism, Nick Cavalancia and Holger Schulze, Founder of the Information Security Community on LinkedIn as they discuss the 5 steps to protect your organization from ransomware.
View Now