Preventing and Detecting Malicious Insiders

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

2018 has brought a new series of examples of how a malicious employee can wreak havoc by taking bribes to leak information, or just by stealing information before and after leaving the job. These cases are not reducing though, and new ways are needed to ensure that those determined to do harm are detected and prevented.
In this webinar, we will look at some examples from this year and look at how insiders still pose a threat, and how to better deal with the problem in the future.
Key takeaways:

  • How to build an IT policy that works for the company’s security, and employee’s usability 
  • How to detect malicious activity, and also prevent unwitting errors
  • What the common signs of malicious action are
  • What can you learn from some of 2018’s headlines


Michael Hill

Former Editor, Infosecurity Magazine

Randy Trzeciak

Technical director of the CERT National Insider Threat Center at the Carnegie Mellon SEI

    Dominic Vogel

    Chief Security Strategist, Cyber.SC

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.