Insiders are the New Malware
Offered By: YouTube
Course Description
Overview
Explore the critical issue of insider threats in cybersecurity through this 40-minute conference talk from Louisville InfoSec 2016. Delve into the evolving landscape of data breaches, examining common factors and their far-reaching impacts. Analyze the roles of CEOs, employee mistakes, and disgruntled workers in security vulnerabilities. Learn effective strategies to counter attackers, including understanding your data, implementing robust data protection methodologies, and managing IT risks. Discover the importance of eliminating global access, simplifying permissions, and identifying data owners. Gain insights on sustaining security measures through regular access reviews and automation. Understand the significance of protecting data from both internal and external threats, eliminating service accounts, and conducting comprehensive risk assessments to safeguard your organization's sensitive information.
Syllabus
Intro
How the company came about
Data Breaches
Key Things in Common
Impact of Breaches
CEO Problems
Employees make mistakes
Disgruntled employees
How do we stop attackers
Understand your data
Data protection methodology
IT risk
Global access
Eliminating global access
Simplifying permissions
Eliminate excessive access
Figure out where people have access
Sustain
Identify Data Owners
Make Decisions
Data Owner
Review Access
Automating
Protect your data
Protect from the inside
Protect from the outside
No more service accounts
Identify owners
Complete Coincidence
Risk Assessment
Related Courses
Essential Google Cloud Infrastructure: Core ServicesGoogle Cloud via Coursera Managing Security in Google Cloud
Google Cloud via Coursera Deep Dive into Amazon Simple Storage Service (Amazon S3)
Amazon via Independent Google Cloud Fundamentals: Core Infrastructure dalam bahasa Indonesia
Google Cloud via Coursera Digital Library
INFLIBNET Centre via Swayam