Browse by category

Select a category to see more related content

The Human Centric Approach to Data Loss Prevention

The Human Centric Approach to Data Loss Prevention

In today’s work-from-anywhere organization, a data loss prevention (DLP) strategy is more essential than ever. Learn how to build a robust human centric approach to data loss prevention.

View Now
Strengthening Your Insider Risk Program

Strengthening Your Insider Risk Program

In this webinar, Dr. Christine Izuakor discusses some of the top insider risk trends and how to strengthen your system in advance.

View Now
Insider Risk Looms the Manufacturing Industry

Insider Risk Looms the Manufacturing Industry

Insider security breaches in manufacturing are now an impending reality requiring companies to safeguard themselves. This webinar dives deeper into the dynamics and challenges leading to the rise of insider incidents in manufacturing and ways to mitigate those.

View Now
Managing Insider Risk vs. Insider Threats

Managing Insider Risk vs. Insider Threats

Learn the difference between insider risk and insider threat and how to shift your processes to focus on managing insider risk.

View Now
Insider Risk in Healthcare and Tips to Mitigate

Insider Risk in Healthcare and Tips to Mitigate

Insiders were responsible for the majority of data breaches in the healthcare industry. In this webinar you will learn how to mitigate those risks.

View Now
Mitigating Insider Risk in Manufacturing

Mitigating Insider Risk in Manufacturing

Learn how to secure high-risk data handling via user activity monitoring of every person in the manufacturing supply chain that accesses IP.

View Now
Combating Insider Threats in Remote Learning Environments

Combating Insider Threats in Remote Learning Environments

Cybersecurity attacks targeting academic institutions are rising exponentially. In this webinar, we discuss ways to manage the insider risk for your organization.

View Now
Leveraging National Cybersecurity Awareness Month to Reduce Insider Threats

Leveraging National Cybersecurity Awareness Month to Reduce Insider Threats

Leverage the National Cybersecurity Awareness Month to raise awareness of insider risk to sensitive data in your organization.

View Now
How Insider Threats Impacts the Financial Sector

How Insider Threats Impacts the Financial Sector

See how insider risk can be managed and mitigated within the financial sector, which today is a prime target of cybercriminals.

View Now
Combating Social Engineering Threats Through Insider Threat Management

Combating Social Engineering Threats Through Insider Threat Management

Social engineering is an insidious way of getting "insider access" into an organization's network and data. Learn how to identify and prevent social engineering with a robust insider threat management program.

View Now
Insider Risk in the Healthcare Sector

Insider Risk in the Healthcare Sector

Dr. Christine Izuakor & Veriato examine the insider threat landscape in healthcare. Learn what your organization can do to manage insider risk.

View Now
Managing The New Insider Risk in the Education Sector & Beyond

Managing The New Insider Risk in the Education Sector & Beyond

Join Dr. Christine Izuakor as she discusses recent trends and impacts of security failures in modern education environment.

View Now
How to Adjust Your Insider Threat Program in Today’s World: Social Engineering Edition

How to Adjust Your Insider Threat Program in Today’s World: Social Engineering Edition

Learn to understand insider threat motivations and actions and recognize those risks ahead of time in this discussion with Dr. Christine Izuakor.

View Now
Cyber Security Awareness Month1

Cyber Security Awareness Month1

In honor of NCSAM, we’re having a conversation around how to manage cyber risk through a user centric approach to threat detection.

View Now
Implementing An Insider Threat Mitigation Framework – Critical Elements For Detecting & Mitigating Insider Threats

Implementing An Insider Threat Mitigation Framework – Critical Elements For Detecting & Mitigating Insider Threats

Learn about the critical elements for implementing an insider threat mitigation framework and what organizational factors can contribute to insider threats.

View Now
New Trends With Ransomware – Fall 2021

New Trends With Ransomware – Fall 2021

Join us as we discuss how a people-centric approach to fighting back against ransomware attacks is one of the best ways to combat this growing plague to businesses.

View Now
The Impact of Ransom Attacks on Supply Chains: Addressing 3rd Party Risk

The Impact of Ransom Attacks on Supply Chains: Addressing 3rd Party Risk

In the past few years, ransomware attacks have rapidly evolved in sophistry and impact. That trend is now gaining new dimensions by targeting the supply chain.

View Now
Ransom Attacks in the Supply Chain: Securing Your Downstream Data

Ransom Attacks in the Supply Chain: Securing Your Downstream Data

Learn about the recent evolution of the supple chain risk. We discuss how to manage third-party risks, automate threat vigilance to mitigate security blind spots and create business continuity plans.

View Now
The Current of Ransomware

The Current of Ransomware

The rising ransomware trend has made it imperative for CISOs and IT security leaders to evaluate and defend their organizations against this ominous threat.

View Now
Ransomware Has Evolved, And So Should Your Company

Ransomware Has Evolved, And So Should Your Company

As ransomware attacks grow and evolve, how can companies arm themselves with the right solutions to defend from these ever-growing attacks? Join Dr. Christine Izuakor and Jay Godse, Head of Product at Veriato as they discuss this important topic.

View Now
Learning From The Most Concerning Breaches Of 2021 So far

Learning From The Most Concerning Breaches Of 2021 So far

Join Dr. Christine Izuakor as she covers what we can learn from the most concerning breaches of 2021 thus far.

View Now
Navigating Cybersecurity Tool Fatigue

Navigating Cybersecurity Tool Fatigue

With so many new vendors pitching "Insider Threat Detection", how do you separate marketing fluff from reality? Join us in our latest episode as we discuss selecting the right tool for your unique business needs.

View Now
How Insider Threats and the Dark Web Increase Remote Work Risk

How Insider Threats and the Dark Web Increase Remote Work Risk

In our latest podcast, we take a deep dive into the gloomiest part of the internet, the “Dark Web” as we try to demystify everything we think we know. This is the realm of internet land where criminals and offenders can be found lurking around every corner. Though there is some truth to this perception, there are also many misconceptions about the Dark Web and its role in the security or insecurity of businesses. Join Dr. Christine Izuakor and a special guest from Equifax, Dr. Michael Owens as we unravel the Dark Web.

View Now
Revisiting 5 Concerning Cyber Trends And Statistics Over The Past Year

Revisiting 5 Concerning Cyber Trends And Statistics Over The Past Year

In our latest podcast, we discuss 5 of the most concerning trends and statistics over the past year. Join Dr. Christine Izuakor and Frank McGovern, Cybersecurity Architect, as they discuss various cybersecurity topics such as the rise of internal threat actors, security and awareness training, and addressing the human element.

View Now
Challenges Of Selecting An Insider Threat Detection Tool

Challenges Of Selecting An Insider Threat Detection Tool

In a crowded market with so many new products being released, it can often be hard to make sure you're getting right the tool for your business needs. Purchasing an Insider Threat Detection tool for your organization requires extensive research, which can be very time-consuming. Learn how to make the right choice.

View Now
Utilizing Employee Monitoring Software For Operational Efficiency And Data Security

Utilizing Employee Monitoring Software For Operational Efficiency And Data Security

Join us in our latest episode hosted by Dr. Christine Izuakor and Anthony Lauderdale, Head of Cyber Defense at Zoom, as we discuss the evolution of Employee Monitoring Software, and how the technology can be utilized to increase operational efficiency in the new remote world. We also discuss Insider Threat Detection and how employees could be influenced by financial data to exfiltrate intellectual property.

View Now
What Do Your Remote Employees Do All Day?

What Do Your Remote Employees Do All Day?

Remote workforce presents organizations with a unique set of challenges when it comes to employee productivity, security and regulatory compliance. Learn how an employee monitoring software can help in all those areas.

View Now
Managing The Compliance & Security Nightmares Caused By A Remote Workforce

Managing The Compliance & Security Nightmares Caused By A Remote Workforce

Find out how to maintain compliance with remote workforce and learn strategies to keep your organization's crucial data secure.

View Now
5 Cybersecurity Priorities To Focus On In 2021

5 Cybersecurity Priorities To Focus On In 2021

The 2020 pandemic resulted in significant challenges to health, wealth, business, and cybersecurity. The early part of the year saw a rapid movement to a remote workforce. Learn about key cybersecurity priorities you need to focus on for the rest of this year.

View Now
Extending Cybersecurity Beyond The Office Perimeter

Extending Cybersecurity Beyond The Office Perimeter

A typical company has various cybersecurity measures in place to make sure all data is secure while employees are at the office. But the Pandemic changed that so how have companies extended those same measures beyond the office into the home?

View Now
Managing Security And Compliance In A Remote World

Managing Security And Compliance In A Remote World

The COVID-19 pandemic has had serious repercussions on the global economy and has also forced millions to work remotely from their homes. But how do maintain compliance and security when your employees work from home?

View Now
User Behavior Analytics & The Zero Trust Approach

User Behavior Analytics & The Zero Trust Approach

In this episode, we discuss the intersection of User And Behavior Analytics and a zero trust approach in a remote work environment.

View Now
Using AI To Detect And Prove Sticky HR Related Issues

Using AI To Detect And Prove Sticky HR Related Issues

Regardless of size, all companies will need to conduct an employee investigation in some shape or form. The key is having a reliable set of data to prove indisputable innocence or guilt. Join Cybersecurity expert, Dr. Christine Izuakor and Intelligence expert, Virgil Capollari as they discuss this topic in detail.

View Now
Managing Compliance & Security In A Remote World

Managing Compliance & Security In A Remote World

Join cybersecurity expert Christine Izuakor she discusses security remote devices, maintaining compliance and regaining visibility into your mobile workforce using user monitoring technology.

View Now
Monitoring a Hybrid Workforce

Monitoring a Hybrid Workforce

A discussion on how technology distributors and resellers can help their clients get a better handle on their remote or hybrid workforce productivity, compliance and data security.

View Now
The New Norm In Cybersecurity

The New Norm In Cybersecurity

Companies will need to permanently account for securing remote workers whether they want to or not. This is the new norm. Join Christine Izuakor and Rolando Lopez as they discuss the measures companies are taking to fully ensure that their data is secure both in the office and at home!

View Now
Productivity Concerns In The Age Of Remote Work

Productivity Concerns In The Age Of Remote Work

Join Cybersecurity expert, Christine Izuakor and Insider Threat expert, Stacey Champagne as they discuss productivity concerns in the age of remote work and offer potential technology and process solutions.

View Now
Lifting The Veil Of The Dark Web

Lifting The Veil Of The Dark Web

See how companies arm themselves with the right tools to protect against threats from the dark web.

View Now
UEBA And The Insider Threat

UEBA And The Insider Threat

How can advancements in technology support security in the workplace? Join us as we discuss how AI and User Behavior Analytics can help with Insider Threats.

View Now
Cybersecurity Trends To Watch in 2020

Cybersecurity Trends To Watch in 2020

Join Cybersecurity expert, Christine Izuakor and Becky Selzer from United Airlines as they discuss what cybersecurity trends to watch in 2020.

View Now
Monitoring A Hybrid Workforce, The New Norm Webinar

Monitoring A Hybrid Workforce, The New Norm Webinar

Watch as we discuss how technology can help this transformation, providing insights and metrics for managing the new normal.

View Now
Out of Sight, Still in Mind – Monitoring Remote Employees

Out of Sight, Still in Mind – Monitoring Remote Employees

We're witnessing the reopening of the world one industry at a time, but the narrative still hasn't changed. Employees are still working remotely and companies are trying to figure out how to efficiently manage remote employees. Join us as we discuss solutions employers are using to effectively monitor and manage their remote workforce.

View Now
The Impacts Of Insider Threats During COVID-19

The Impacts Of Insider Threats During COVID-19

The pandemic has caused hardship for many due to sudden layoffs and pay cuts, leaving the door open for numerous potential monetary opportunities through data theft or data exfiltration. This is real and it's a problem. Listen to our latest discussion with cybersecurity expert, Dr. Christine Izuakor and Insider Threat Expert, Leticia Lampkin from Google to learn more!

View Now
Recent Fraud Trends Amidst The Ongoing Pandemic

Recent Fraud Trends Amidst The Ongoing Pandemic

Millions of people all over the world have been forced to work remotely due to the Covid-19 pandemic, and multiple industries have been disrupted in a way never seen on this scale before. Companies that succeed in this new world will be those leveraging fraud prevention software that provides advanced detection and prevention capabilities.

View Now
Preventing Data Leakage When Employees Leave

Preventing Data Leakage When Employees Leave

Learn how to detect and stop the unauthorized transfer of data when employees leave your company.

View Now
Effectively Managing The Shift To A Remote Workforce Webinar

Effectively Managing The Shift To A Remote Workforce Webinar

Join cybersecurity expert, Dr. Christine Izuakor as she takes a look at the current pandemic, how previous pandemics have impacted cybersecurity and how COVID-19 has changed the nature of remote work.

View Now
The Evolution of Digital Forensics

The Evolution of Digital Forensics

Like a trail of evidence criminals may leave behind after committing a crime; almost every digital activity leaves virtual fingerprints.

View Now
What Is NextGen Threat Hunting?

What Is NextGen Threat Hunting?

In this episode, we cover confessions of a cybersecurity threat hunter by talking to Jason Colyar, an cybersecurity industry expert with years of threat hunting experience.

View Now
Combating Insider Threats During Tax Fraud Season

Combating Insider Threats During Tax Fraud Season

Digital fraud and theft are forms of cybercrime that involve creative attack tactics and deception. In this episode, we discuss how to protect yourself from digital fraud and data theft with a behavioral analytics and insider risk management program.

View Now
Reducing Cyber Risk With AI and User Behavior Analytics

Reducing Cyber Risk With AI and User Behavior Analytics

Find out how user behavior analytics powered by machine learning can help your organization manage cyber and insider risk.

View Now
Fraud Prevention With User Behavior Analytics Webinar

Fraud Prevention With User Behavior Analytics Webinar

Without deep visibility into user activity within an organization, suspicious behaviors that signal fraud may go unnoticed and insiders can profit by selling your sensitive data. In this webinar, we deep dive into fraud prevention with the help of user behavioral analytics.

View Now
The Rise of Ransomware As A Service (RAAS) Webinar

The Rise of Ransomware As A Service (RAAS) Webinar

Join Nick Cavalancia from Techvangelism and Cyber Security Expert, Dr. Christine Izuakor as we discuss ransomware as a service (RAAS) and how this threat could be impacting your business.

View Now
Counterforensics: How Insiders Evade Forensics

Counterforensics: How Insiders Evade Forensics

Sophisticated data theft and other covert malicious actions by insiders can involve covering their tracks with tools to erase data, hide data or even appear to be activities other than what actually occurred.

View Now
User Behavior Analytics and the Benefits to Companies

User Behavior Analytics and the Benefits to Companies

When insiders go "rogue" their behavior changes as they shift from simply performing their function to engaging in activities that harm your organization. User Behavior Analytics (UBA) software watches for signs of change that are directly related to insider threats, and alerts you as soon as meaningful anomalies are detected.

View Now
Monitoring High Risk Positions – How UBA & UAM Help

Monitoring High Risk Positions – How UBA & UAM Help

Insiders – a company’s employees, vendors, and contractors – may pose a greater threat to cyber security than all outside malicious actors combined. The reason, of course, is quite simple: Insiders already have system authentication and access to any number of the company’s critical cyber assets.

View Now
Mitigating Employee Risk—Keep Hires from Starting Fires

Mitigating Employee Risk—Keep Hires from Starting Fires

The two times that employment risk is most evident is when hiring employees and when firing them… plus all the times in between. You, as an employer, are always at risk when dealing with employees from the time you hire them until the time they leave. Join us as we discuss tips for Pre-hire and Post-hire employee risk mitigation.

View Now
Master the Game of Who: Combating Insider Threats

Master the Game of Who: Combating Insider Threats

Join Dr. Eric Cole as he leads a frank discussion with security experts Vince Berk and Mike Tierney about common insider threat scenarios, the phases of a malicious attack and how a combination of network behavior intelligence and user activity intelligence can give you the power to quickly detect, mitigate and defend against all types of insider attacks.

View Now
Insider Threats and the Real Financial Impact to Organizations Webinar

Insider Threats and the Real Financial Impact to Organizations Webinar

Insider threats have become the Achilles' heel of most corporate security strategies that rely primarily on access management, network analysis or trying to lock down sensitive documents. Learn about what Insider threats are, and how to detect and prevent them.

View Now
How User Behavior Analytics Mitigates IP Theft By Employees

How User Behavior Analytics Mitigates IP Theft By Employees

An introduction to the benefits of User Behavior Analytics in assessing employee behavior.

View Now
3 Steps to Protect Your Data During The High Risk Exit Period

3 Steps to Protect Your Data During The High Risk Exit Period

Learn how organizations can improve their security stance during the high risk exit period by taking a few steps that work to both protect against and prevent risky exit behavior.

View Now
Spotting the Insider Threat: Knowing What to Look For

Spotting the Insider Threat: Knowing What to Look For

The greatest challenge in identifying a threat is knowing what actions to be watching and which of them constitute a potential threat. With benign and threatening insider activity looking so similar, it’s no wonder it takes months to identify data breaches or fraud.

View Now
Monitoring Employees In A Remote Workplace

Monitoring Employees In A Remote Workplace

Watch as Insider Threat expert, Nick Cavalancia from Techvangelism discusses the challenges of gauging productivity and measuring results in remote workforce environment.

View Now
Implementing a User Activity & Behavior Monitoring Program

Implementing a User Activity & Behavior Monitoring Program

This Webinar is intended to assist companies in determining how to best implement a user activity monitoring and / or user behavior analytics program.

View Now
How User Behavior Analytics Reduces Insider Threat

How User Behavior Analytics Reduces Insider Threat

An introduction to the benefits of User Entity Behavior Analytics (UEBA) in assessing data leakage. UEBA can help you detect data breaches, sabotage, privilege abuse, and policy violations made by your own staff.

View Now
How to Leverage Technologies to Alert and Block Dark Web Access Webinar

How to Leverage Technologies to Alert and Block Dark Web Access Webinar

So how do companies arm themselves with the right tools to protect themselves against rogue access to the Dark Web?

View Now
How Mature Is Your Insider Threat Program?

How Mature Is Your Insider Threat Program?

Join Insider Threat expert, Jim Henderson from Insider Threat Defense, Nick Cavalancia from Techvangelism and Cyber Security Expert, Patrick Knight as they discuss A Nonexistent Insider Threat Program.

View Now
Effective Incident Response Through User Activity Monitoring

Effective Incident Response Through User Activity Monitoring

Join cyber security expert, Derek A. Smith (CISSP) and Nick Cavalancia from Techvangelism as they discuss responding to a data breach and other cybersecurity incidents more effectively with the help of user behavioral analytics.

View Now
Building An Insider Threat Program

Building An Insider Threat Program

Developing and executing an Insider Threat Program that aligns with corporate values and data sources, brings about some unique challenges and concerns. Join Insider Threat expert, Jim Henderson from the Insider Threat Management Group and Nick Cavalancia from Techvangelism as they discuss best practices of establishing an insider threat program at your organization.

View Now
5 Steps to Protect Your Organization Against the Ransomware Threat

5 Steps to Protect Your Organization Against the Ransomware Threat

Join security expert and founder of Techvangelism, Nick Cavalancia and Holger Schulze, Founder of the Information Security Community on LinkedIn as they discuss the 5 steps to protect your organization from ransomware.

View Now