Insider Risk, Ransomware

How to Leverage Technologies to Alert and Block Dark Web Access Webinar

On-Demand Webinar

We’ve all seen what’s possible with the Dark Web thanks to Silk Road. If you’re interested in buying or selling someone’s private data like social security numbers or credit card information, it’s disturbingly easy to do. All you need is a computer, a Tor Browser and Cryptocurrency, and it’s all completely anonymous.

So how do companies arm themselves with the right tools to protect themselves against rogue access to the Dark Web?

Nick Cavalancia

Nick Cavalancia

Chief Techvangelist

Nick Cavalancia has over 20 years of enterprise IT experience, 10 years as a tech marketing executive and is an accomplished technology writer, consultant, trainer, speaker, and columnist.

Patrick Knight

Patrick Knight

Senior Director of Cyber Strategy and Technology

Patrick is a leader in actionable UAM and UEBA helping industries identify and protect against insider threats. He has spent 12 years in the U.S. Intelligence Community helping to protect the country. Since 2001 he has worked for major security leaders developing technologies and guiding online security policies.

Get Instant Access

Employee Monitoring Resources

Workforce Security & Productivity – 2023 Best Practices

Workforce Security & Productivity – 2023 Best Practices

Join us for for a “fireside chat” as David Morrow, CMO, Veriato questions Monique Rotunda, Head of Sales, Veriato, and Chris Roney, Director of Sales North America, Endpoint Protector, on key trends in insider risk management and data loss protection in 2023. In this...

The Human Centric Approach to Data Loss Prevention

The Human Centric Approach to Data Loss Prevention

In today’s work-from-anywhere organization, a data loss prevention (DLP) strategy is more essential than ever. A critical part of DLP strategy is to understand the intent behind why people move files, email spreadsheets, print documents and upload files outside your...