Webinar

Dark Reading: Malicious Insiders - Real Defense for Real Business

How to Protect Sensitive Data Across the Connected Enterprise

Traditional security models are focused on zero trust at the network and application layers to "keep the bad guys out." This approach does nothing to protect you from the credentialed users who are already inside the network. How can you give staff all the tools and access privileges they need to be productive, without leaving the organization open to unnecessary risk?

Plus, sensitive data is everywhere throughout the enterprise from on-prem to cloud to data lakes and cloud data warehouses. How can you possibly protect it all?  Network and endpoint security try to keep the bad guys out, but the reality is breaches are still on the rise.

Watch this webinar to learn more about the insider threat and find out how you can protect all your sensitive data without impacting the business.

Register Here

Dark Reading: Malicious Insiders - Real Defense for Real Business

How to Protect Sensitive Data Across the Connected Enterprise

Published on Apr 15, 2020
Reading Time:
Download this resource

Authors

Speakers

Dave Sikora

A software industry veteran, Dave has previously served as CEO of 2 public and 5 private, venture capital backed software companies and has held board director positions with 4 public companies. He executed the first Internet Software IPO in the State of Texas in 1995 and collectively his companies have raised over $100M in venture capital and have experienced exits and value creation events of almost $1B. Dave was most recently the CEO of Stratfor, a global intelligence and research firm with industry-leading products focused on emerging global physical and cybersecurity threats. Dave is an alumnus of the University of Houston and Harvard Business School.

Jason Truppi

Former Cyber Special Agent for the FBI, Director of Security at Tanium, Cybersecurity Fellow at the Center for Strategic & Int’l Studies