The Threat Within eBook

Insider threats can be among the most difficult attacks to detect because the attackers are often trusted staff, contractors or partners who need not launch complex, multi-pronged attacks necessary to breach network perimeters.

They are already inside the network and may already possess sufficient privileges to access the data they seek. If they don't, they may need only go as far as an unlocked nearby computer.

Security professionals gathered in Sydney to learn more about the threat and ways their organisations can put themselves in the best position possible to both reduce the chance of insider theft occurring and ensure a swift response to offenders.

Inside you'll find:

  • Tips to mitigate insider threats.
  • Case studies and lessons in insider threat prevention, deterrence and forensics.
  • Advice from Websense on locking down your data.
This content has been created and paid for by Websense

Log In

Email:
Password:
  |  Forgot your password?