Insider Risk, User Behavior Analytics

Counterforensics: How Insiders Evade Forensics

On-Demand Webinar

Sophisticated data theft and other covert malicious actions by insiders can involve covering their tracks with tools to erase data, hide data or even appear to be activities other than what actually occurred.
Nick Cavalancia

Nick Cavalancia

Chief Techvangelist

Nick Cavalancia has over 20 years of enterprise IT experience, 10 years as a tech marketing executive and is an accomplished technology writer, consultant, trainer, speaker, and columnist.

Patrick Knight

Patrick Knight

Senior Director of Cyber Strategy and Technology

Patrick is a leader in actionable UAM and UEBA helping industries identify and protect against insider threats. He has spent 12 years in the U.S. Intelligence Community helping to protect the country. Since 2001 he has worked for major security leaders developing technologies and guiding online security policies.

Get Instant Access

Employee Monitoring Resources

The Human Centric Approach to Data Loss Prevention

The Human Centric Approach to Data Loss Prevention

In today’s work-from-anywhere organization, a data loss prevention (DLP) strategy is more essential than ever. A critical part of DLP strategy is to understand the intent behind why people move files, email spreadsheets, print documents and upload files outside your...

Strengthening Your Insider Risk Program

Strengthening Your Insider Risk Program

Insider risk has increased 47% in the past two years. Theft, data leakage, hacking - insider risk is a real threat to your bottom line. It comes from employees and others granted access to your internal systems, and most companies do not have the technology or...