Infosecurity Group Websites
Magazine
Events
Infosecurity Europe
Infosecurity Leadership Summit
Infosecurity Magazine Events
Infosecurity North America
Infosecurity Netherlands
Infosecurity Belgium
Infosecurity Russia
Infosecurity Mexico
Infosecurity Middle East
Insight
Infosecurity Webinars
Infosecurity Whitepapers
Infosecurity Online Summits
Latest
Satacom Malware Campaign Steals Crypto Via Stealthy Browser Extension
Critical Zero-Day Flaw Exploited in MOVEit Transfer
Spanish Bank Globalcaja Hit By Ransomware Attack
#HowTo: Balance Cybersecurity Budgets and Risk in Midsize Enterprises
UK Closes CCP Cyber Certification Scheme
News
Topics
Features
Webinars
White Papers
Podcasts
Events & Conferences
Directory
Search
Infosecurity Magazine Home
»
Webinars
»
Preventing and Detecting Malicious Insiders
22 Jan 2019
Webinar
Preventing and Detecting Malicious Insiders
Speakers
Otavio Freire
President & CTO
,
SafeGuard Cyber
Follow @OtavioFreire
Connect on LinkedIn
Michael Hill
Former Editor
,
Infosecurity Magazine
Email Michael
Follow @MichaelInfosec
Randy Trzeciak
Technical director of the CERT National Insider Threat Center at the Carnegie Mellon SEI
Dominic Vogel
Chief Security Strategist, Cyber.SC
Email Dominic
Follow @domvogel
Brought to You by
SafeGuard Cyber
Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s
privacy policy
for additional information.
Why Not Watch?
14 Sep 2017
Be Less Man vs Machine, More Man and Machine
28 Apr 2022
Updating Your Security Strategy to the Evolving Insider Threat Risk
3 Sep 2015
Secure Tomorrow Today – (ISC)2 Congress EMEA 2015, An Insider’s Look
10 Dec 2020
Enabling Secure Access: Anywhere, Any Device and Any Application
Related to This Story
#InfosecNA18 Video Interview - Ransomware, Phishing & BEC - The New Threats
Orgs Grapple with Pros and Cons of Remote Workers
Unified Identity: the Passport to Secure Personal Data Management
Cybercrime Costs Firms $13m Each as Malicious Insider Threat Grows
#NITAM: Mitigating Non-Malicious Insider Risk
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
1
2 Jun 2023
News
Chinese Phishing Gang "PostalFurious" Expands Campaign
2
2 Jun 2023
News
Kaspersky Says it is Being Targeted By Zero-Click Exploits
3
1 Jun 2023
News
Amazon to Pay $31m After FTC's Security and Privacy Allegations
4
30 May 2023
News
Human Error Fuels Industrial APT Attacks, Kaspersky Reports
5
30 May 2023
News
Dark Web Data Leak Exposes RaidForums Members
6
30 May 2023
News
Retailer Database Error Leaks Over One Million Customer Records
1
31 May 2023
News
Pentagon Cyber Policy Cites Learnings from Ukraine War
2
30 May 2023
News
Ransomware Gangs Adopting Business-like Practices to Boost Profits
3
30 May 2023
News
Retailer Database Error Leaks Over One Million Customer Records
4
2 Jun 2023
News
Insurers Predict $33bn Bill for Catastrophic "Cyber Event"
5
30 May 2023
News
Nigerian Cybercrime Ring's Phishing Tactics Exposed
6
30 May 2023
News
Dark Web Data Leak Exposes RaidForums Members
1
23 May 2023
Webinar
The Growing Importance of Digital Forensics and Incident Response in Corporate Environments
2
18 May 2023
Webinar
The ChatGPT Revolution: The Role of Large Language Models in Enterprise IT
3
3 May 2023
Webinar
Adapting Your Data Security Strategy to the Latest Cyber Threats
4
11 May 2023
Webinar
How to Transfer Data Securely When Moving to the Cloud
5
9 Mar 2023
Webinar
Authentication Security: Crafting a Bulletproof Password Reset Process
6
20 Apr 2023
Webinar
How to Mitigate Cyber-Risks Through a Threat Exposure Management Program
1
25 Apr 2023
News
#RSAC: Election Protection is CISA’s Top Priority for Next 18 Months
2
11 Apr 2023
News Feature
Replacing GDPR in the UK: Assessing AI and Research Provisions
3
24 Apr 2023
News
#RSAC: Understanding AI's Role in Cybersecurity Beyond the Hype
4
25 Apr 2023
News
Thousands of Social Media Takedowns Hit People Smugglers
5
25 Apr 2023
Opinion
Pulling Back the Curtain to Address TikTok Security Concerns
6
20 Apr 2023
Webinar
How to Mitigate Cyber-Risks Through a Threat Exposure Management Program
Please wait…