![Default self created cybersecurity insiders image low res](https://www.cybersecurity-insiders.com/wp-content/uploads/Default-self-created-cybersecurity-insiders-image-low-res-696x397.jpg)
![Default self created cybersecurity insiders image low res](https://www.cybersecurity-insiders.com/wp-content/uploads/Default-self-created-cybersecurity-insiders-image-low-res-696x397.jpg)
Veriato is organizing aĀ webinar on insider threats and how user behavior analytics can help you to mitigate data theft by departing employees [Register here].
The cyber actor with the greatest capacity to cause harm to your organization is not the so-called state-sponsored hacker or cyber-terrorists. It is the āinsiderā ā your companyās employees, ex-employees, and trusted vendors.
Most IT systems are protected by defensive technologies which present a significant hurdle to unauthenticated outsiders. However, the company insiders have authentication credentials that allow them past the defensive technologies and provide them with easy access to the companyās intellectual property.
Join cyber security experts Derek A. Smith (CISSP) and Nick Cavalancia from Techvangelism as they discuss:
- Quantifying IP theft by employees
- How employees steal intellectual property
- General recommendations for preventing IP theft
DATE & TIME: May 11, 2017 @ 11 AM ET | 10 AM CT
PRESENTERS: Derek A. Smith (CISSP); Nick Cavalancia (Techvangelism)
WeĀ look forward to seeing you at the webinar (if you can’t make the time, please register and we will send you the webinar recording)!