Video highlights from the Insider Threat Breakfast Briefing

Highlights from Cyberseer's and Darktrace's the Insider Threat Breakfast Briefing, What is Insider Threat? Watch it here.

We had a full house at the Insider Threat breakfast briefing. For those who couldn’t attend and missed out on our speakers discussing who are the “insiders”, how they operate, what motivates them and what threats they pose to information systems, here’s some video footage:

  • Highlights from the Insider Threat Breakfast Briefing
  • What is Insider Threat?
  • Insider Threat in Context
  • Detecting Insider Threat – Cyberseer demonstrates how they detect ‘insider threat’ using Darktrace

 

 

‘Insider threat’ is a prevalent successful attack vector in an organisation. Did you know? It can take an average of 240 days to detect an insider threat and an average of 70 days to resolve that threat. So in total, we’re looking at an entire year of potential operational costs and other costs incurred due to malicious insiders.

At this briefing, Cyberseer explained how new and emerging tools from Darktrace and forensic analysis from the Cyberseer team can support organisations with the mitigation of the insider threat problem. For more information, read our white paper – Detecting Insider Threat.

Discuss the threats affecting your network:
T: +44(0)203 823 9030
E: info@cyberseer.net
Contact us

Video highlights from the Insider Threat Breakfast Briefing

Leave a reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Contact us

Have questions, need assistance, or ready to enhance your cybersecurity strategy? Our team at Cyberseer is here to help. Reach out to us for personalised guidance and expert advice.

More blogs to explore

Why is visibility so important in today’s new norm of remote working?

Visibility is crucial in today’s new norm – remote work cyber security

Exabeam to enhance Cyberseer’s 24 x 7 security services & offer Exabeam MSSP

Cyberseer’s 24 x 7 security services enhanced by offering Exabeam MSSP

Third Party Compromise: ClickFix Malware Attack - How ClickFix Paste and Run Malware Exploited Two Industries & What We Learned

Third Party Compromise: ClickFix Malware Attack

These advanced technologies power our MSSP SOC Service offering: