Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

The Threat from Within: What Can We Learn from the Edward Snowden Affair?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Edward Snowden was a ‘privileged user’, and these users exist within all organizations. Root users, domain administrators, system administrators or other high-level IT personnel often have powerful and privileged access rights. 

Although they require a high level of access to perform their job functions, there are significant security issues that arise when these users also have access to data stored within computer systems, and the ability to read, copy, or alter documents and other files. This webinar will delve into the details of insider threats, exploring the risks posed by privileged users and incorporating newly released research that will show the impact this threat is having on enterprises, while discussing methods to overcome it.

During this webinar you will:

  • Examine the latest research findings into insider threats
  • Understand what a privileged user is and why they present a risk to enterprises
  • See what can be learned from the Edward Snowden affair – the privileges he had and how they were abused
  • Find out how privileged users can be exploited by outside attackers
  • Discover the best methods to overcome insider threats and prevent privileged users from unauthorized access


Drew Amorosi

Drew Amorosi Deputy Editor, Infosecurity Magazine

Sol Cates

CSO, Vormetric

    Dave Clemente

    Senior Research Analyst, Information Security Forum

      Brought to You by