Работайте офлайн с приложением Player FM !
Episode 98: Transparency as a Tool to Combat Insider Threats
Manage episode 436616171 series 3382533
In episode 98 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.
Together, they embrace transparency as a vehicle for the cybersecurity industry to better defend against insider threats.
Here are some highlights from our episode:
- 01:28. How KnowBe4 detected an insider threat from North Korea
- 09:09. How the Center for Internet Security® (CIS®) responded to news of this incident
- 21:02. The role of technical controls in detecting these types of threats
- 23:56. Common signs you can use to detect fake employees in your hiring process
- 29:22. How cybersecurity companies can use this incident to improve their defenses
Resources
- How a North Korean Fake IT Worker Tried to Infiltrate Us
- North Korean Fake IT Worker FAQ
- Episode 77: Data's Value to Decision-Making in Cybersecurity
- Defense-in-Depth: A Necessary Approach to Cloud Security
- eBook: A CISO’s Guide to Bolstering Cybersecurity Posture
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
108 эпизодов
Manage episode 436616171 series 3382533
In episode 98 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.
Together, they embrace transparency as a vehicle for the cybersecurity industry to better defend against insider threats.
Here are some highlights from our episode:
- 01:28. How KnowBe4 detected an insider threat from North Korea
- 09:09. How the Center for Internet Security® (CIS®) responded to news of this incident
- 21:02. The role of technical controls in detecting these types of threats
- 23:56. Common signs you can use to detect fake employees in your hiring process
- 29:22. How cybersecurity companies can use this incident to improve their defenses
Resources
- How a North Korean Fake IT Worker Tried to Infiltrate Us
- North Korean Fake IT Worker FAQ
- Episode 77: Data's Value to Decision-Making in Cybersecurity
- Defense-in-Depth: A Necessary Approach to Cloud Security
- eBook: A CISO’s Guide to Bolstering Cybersecurity Posture
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
108 эпизодов
Все серии
×Добро пожаловать в Player FM!
Player FM сканирует Интернет в поисках высококачественных подкастов, чтобы вы могли наслаждаться ими прямо сейчас. Это лучшее приложение для подкастов, которое работает на Android, iPhone и веб-странице. Зарегистрируйтесь, чтобы синхронизировать подписки на разных устройствах.