The Threat from Within: What Can We Learn from the Edward Snowden Affair?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Edward Snowden was a ‘privileged user’, and these users exist within all organizations. Root users, domain administrators, system administrators or other high-level IT personnel often have powerful and privileged access rights. 

Although they require a high level of access to perform their job functions, there are significant security issues that arise when these users also have access to data stored within computer systems, and the ability to read, copy, or alter documents and other files. This webinar will delve into the details of insider threats, exploring the risks posed by privileged users and incorporating newly released research that will show the impact this threat is having on enterprises, while discussing methods to overcome it.

During this webinar you will:

  • Examine the latest research findings into insider threats
  • Understand what a privileged user is and why they present a risk to enterprises
  • See what can be learned from the Edward Snowden affair – the privileges he had and how they were abused
  • Find out how privileged users can be exploited by outside attackers
  • Discover the best methods to overcome insider threats and prevent privileged users from unauthorized access


Photo of Drew Amorosi

Drew Amorosi

Deputy Editor, Infosecurity Magazine

Photo of Sol Cates

Sol Cates

CSO, Vormetric

Photo of Dave Clemente

Dave Clemente

Senior Research Analyst, Information Security Forum

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.