The Threat from Within: What Can We Learn from the Edward Snowden Affair?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

Edward Snowden was a ‘privileged user’, and these users exist within all organizations. Root users, domain administrators, system administrators or other high-level IT personnel often have powerful and privileged access rights. 

Although they require a high level of access to perform their job functions, there are significant security issues that arise when these users also have access to data stored within computer systems, and the ability to read, copy, or alter documents and other files. This webinar will delve into the details of insider threats, exploring the risks posed by privileged users and incorporating newly released research that will show the impact this threat is having on enterprises, while discussing methods to overcome it.

During this webinar you will:

  • Examine the latest research findings into insider threats
  • Understand what a privileged user is and why they present a risk to enterprises
  • See what can be learned from the Edward Snowden affair – the privileges he had and how they were abused
  • Find out how privileged users can be exploited by outside attackers
  • Discover the best methods to overcome insider threats and prevent privileged users from unauthorized access


Drew Amorosi

Drew Amorosi Deputy Editor, Infosecurity Magazine

Sol Cates

CSO, Vormetric

    Dave Clemente

    Senior Research Analyst, Information Security Forum

      Brought to You by

      Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.