Insiders are the New Malware
Offered By: YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical issue of insider threats in cybersecurity through this 40-minute conference talk from Louisville InfoSec 2016. Delve into the evolving landscape of data breaches, examining common factors and their far-reaching impacts. Analyze the roles of CEOs, employee mistakes, and disgruntled workers in security vulnerabilities. Learn effective strategies to counter attackers, including understanding your data, implementing robust data protection methodologies, and managing IT risks. Discover the importance of eliminating global access, simplifying permissions, and identifying data owners. Gain insights on sustaining security measures through regular access reviews and automation. Understand the significance of protecting data from both internal and external threats, eliminating service accounts, and conducting comprehensive risk assessments to safeguard your organization's sensitive information.
Syllabus
Intro
How the company came about
Data Breaches
Key Things in Common
Impact of Breaches
CEO Problems
Employees make mistakes
Disgruntled employees
How do we stop attackers
Understand your data
Data protection methodology
IT risk
Global access
Eliminating global access
Simplifying permissions
Eliminate excessive access
Figure out where people have access
Sustain
Identify Data Owners
Make Decisions
Data Owner
Review Access
Automating
Protect your data
Protect from the inside
Protect from the outside
No more service accounts
Identify owners
Complete Coincidence
Risk Assessment
Related Courses
AWS IAM (Identity and Access Management) - Deep DiveA Cloud Guru AZ-140: Microsoft Certified Azure Virtual Desktop Specialty
A Cloud Guru Establishing an Organization on Google Cloud Platform
A Cloud Guru Introduction to Identity and Access Management (IAM)
A Cloud Guru Amazon API Gateway for Serverless Applications (French)
Amazon Web Services via AWS Skill Builder