Insider Threats: Avoiding the Next Snowden

Streaming video - 2015

Not since the days of Daniel Ellsberg and the Pentagon Papers have we seen the likes of a classified material leak of the size and significance executed by the now infamous NSA contractor, Eric Snowden. This devastating loss of sensitive information has served as yet another wake-up call to organizations both public and private to tighten up their data security policies and protocols in an effort to lessen the chance of a repeat performance. In this program expert Kevin Jones, Senior Information Security Engineer for Thycotic Software, discusses the critical nature of Insider Threats today. In addition he offers advice and best practices that will help IT and business leaders reduce the risk of an insider compromising private organizational... data and information. After successfully completing this segment you should be able to: Identify Insider Threats and the IT trends that may be making organizations more vulnerable to them Recognize the characteristics of an insider who threatens IT security Understand the approach organizations should take in order to effectively monitor and detect Insider Threats today Discuss threat detection methods that will be available in the future.

Saved in:
Subjects
Published
[San Francisco, California, USA] : Kanopy Streaming 2015.
Language
Undetermined
Corporate Author
Kanopy (Firm)
Corporate Author
Kanopy (Firm) (-)
Online Access
A Kanopy streaming video
Cover Image
Item Description
Title from title frames.
In Process Record.
Physical Description
1 online resource (streaming video file)
Playing Time
Du:ra:ti
Format
Mode of access: World Wide Web.
Access
AVAILABLE FOR USE ONLY BY IOWA CITY AND RESIDENTS OF THE CONTRACTING GOVERNMENTS OF JOHNSON COUNTY, UNIVERSITY HEIGHTS, HILLS, AND LONE TREE (IA).