Security & Risk Management

Insider Threats and Attacks: Detection and Prevention (Technical Briefings)

Course Overview
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization to recover from. In this report Jason Mical, Director of Network Forensics at AccessData, offers advice and best practices to help organizations reduce the risk of a successful insider attack on enterprise data, systems and networks.

Track: Technical Briefings
In-depth information on new technologies, techniques and solution providers




Learning Objectives:

Upon successful completion of this segment, you should be able to:

  • Understand the nature of an insider-attack and the profile of a typical attacker;
  • Discuss insider-attack methods and the systems and applications that may be particularly vulnerable to malicious attacks;
  • Explain ways organizations can reduce the risk of an insider attack.

Content Partner:

WatchIT

Prerequisites/Advanced Preparation:

None

Speaker / Author:

Photo of Jason Mical

Jason Mical is responsible for the global management of Access Data's Network Forensic solutions and assists AD's customers with the assessment of IT risk reduction in such areas as electronic intercepts, intrusion analysis, virus detection, incident response, privacy, asset management, policies, standards and guidelines. Jason also offers his expertise and consulting services to customers and other audiences on issues of electronic, computer, and physical security investigations.

Jason has more than 17 years of experience in telecommunications fraud prevention, physical security management and network security investigations. During his career, he has developed and implemented overall network security, physical security and fraud control programs for several global organizations. He has also developed security and fraud awareness training seminars used to educate employees, as well as federal, state and local law enforcement officials, and has established and operated security incident response teams and forensic investigation units for several large enterprise organizations.

Jason has been an active member with the FBI Infraguard, United States Secret Service Electronic Crimes Task Force, ISSA, HTCIA, ASIS, ANSIR and CTIA Fraud Task Forces.

Software & Hardware Requirements:

  • 56k or Greater Internet Connection
  • Adobe Acrobat® Reader for the .pdf files
  • Adobe® Flash® Player 8 or higher
  • Modern DHTML Compatible Browser
  • Ram: 256 MB minimum
  • Sound card with speakers/headphones
  • Windows or Mac OS

Buy

Price (USD)

Standard Rate: $29.00
Subscribers: $29.00
Pillsbury U Online: $29.00
Metro State Univ: FREE

Details

Course Code : WIT-1813

Release Date : 09/01/2016
Expire Date : 10/01/2018
Credits :
CEU 0.50
ISC 0.50
PMI PDU 0.50

Passing Grade : 70%
Course Level : Basic

Format Type : eLearning

Returning Subscribers

Login
- OR -
Login