A Malicious Insider's Guide to Compromising Encrypted Networks
Date: 18th June 2014
Time: 2:00 p.m. - 3:00 p.m. BST
IT administrators and external contractors are trusted insiders with privileged access rights that often times have the broadest access to organization's critical business information, which is usually transmitted in encrypted form. This blinds forensic teams from knowing what exactly they are actually doing, posing a potential threat.
In this webinar, we will show you:
- The playbook malicious insiders use to steal mission critical data from your organization and get away without trace.
- Common gaps in your security intelligence and DLP architecture.
- The interplay between managing encrypted sessions and how to prevent data loss or theft before it actually happens.
Speaker: Mathhew McKenna, Chief Operations Officer, SSH Communications Security