SORT BY Relevancy
As part of the SwishData Cyber Attack Defenders campaign, we are interviewing a number of partners who are supporting this new effort. Today we are speaking with Sol Cates, Chief Security Officer at Vormetric.
Security and Information Event Managers (SIEM) tools rely heavily on perimeter security logs, like those from firewalls, IPS and router NetFlow, The sharing of these logs with SIEMs have been very successful in identifying sophisticated external attacks in very early stages. Now, for most organizations, the most severe data breaches are coming from privileged insiders or from Advanced Persistent Threats (APT) that imitate the privileged user. In this podcast Caleb talks with experts from Vormetric to explore if it is possible to use the tried and true SIEM and anomaly detection techniques with file system level log information to detect and identify APT and Insider abuse.
With growing numbers of cybercriminals and nation state actors intent upon stealing your electronic assets, disrupting your business operations and pilfering your intellectual property, you now need proactive strategies in place to mitigate risks that go beyond a traditional perimeter firewall. The most dangerous data theft threats are coming from the internal privileged user - not always the actual user, but often an external party that compromised a privileged user with Advance Persistent Threat (APT) tactics. Allowing privileged users, such as database, server, hypervisor, cloud infrastructure and storage admins, access to sensitive data unnecessarily increases the risk surface of your business and greatly simplifies an APT's mission of stealing your most valued data. In this podcast Caleb Barlow will be joined by Vormetric Executives: CEO Alan Kessler and CSO Sol Cates, and the 2BSecure President and Former Chief Information Security Officer, Central Intelligence Agency (CIA), Bob Bigman. We will discuss the latest data-theft trends and modern techniques to protect your data as close to the source as possible with data centric security and data firewalls across physical, virtual, private cloud and public cloud environments. The solution will include exploration of IBM InfoSphere Guardium products, encryption techniques, strong policy controls, and security intelligence.
Topics or interested parties may also include SafeNet, Trend Micro, Oracle, NTAP, VMware, AWS, Imperva customers using or considering TDE, FDE, volume encryption, privileged users access management (PAM), Database Account Monitoring (DAM), Vulnerability assessment tools, data discovery and data leak prevention (DLP) .
Employees with access to sensitive data remain a critical security vulnerability - but there are practical steps for addressing the issue from within.
The Edward Snowden leaks highlighted that if the NSA can have its sensitive documents stolen by an employee, anyone can. According to the 2015 Vormetric Insider Threat Report, 89% of global respondents felt that their organisation was now more at risk from an insider attack with 34% saying they felt very or extremely vulnerable.
According to corporate security firm Espion, while the frequency of cyber incidents is on the rise, hackers trying to gain access to critical information are not always to blame, with insider involvement remaining a significant problem.
The methods used to transfer data can include uploading to online network storage, email transmission, storage on local media including USB memory sticks, CD’s or DVD’S and other data exfiltration methods. The information sought by hackers is multifaceted and varied and depending on the nature of the target’s business can include; intellectual property, financial information, customer or client related information, project plans, business presentations, blueprints and personnel details.
'Insider abuse is more difficult to detect, as the perpetrators often have legitimate access to sensitive data and removing it may go completely unnoticed,' said senior Espion consultant John Hetherton, commenting on incidents of security breaches from within organisations...
Join Host Live Chats
- John Baptist (111 chatters)
- HINDSIGHT RADIO (21 chatters)
- thelordshour (16 chatters)
- Marti Oakley (12 chatters)
- The Hereafter Is Now Network (10 chatters)
- Witch School (10 chatters)
- Lets talkXGod is not Religious (9 chatters)
- Native Trailblazers (8 chatters)
- The Spirit Science Network (7 chatters)
- The Invisible College Radio (6 chatters)
- RaptureCentric101 (6 chatters)
- SHILOAH (5 chatters)
- The NIGGA CHURCH (5 chatters)
- Doctor Ginny (5 chatters)
- Psychic Melinda (5 chatters)
- The Sinners Ball (5 chatters)
- WARRIOR OUTREACH RADIO NETWORK (4 chatters)
- Donny C (4 chatters)
- High Frequency Radio Network (4 chatters)
- Mystical Awakenings Radio (4 chatters)
- Ohio Exopolitics (3 chatters)
- Louis Teverini and Freddy Doll (3 chatters)
- Kardec Radio (3 chatters)
- Paranormal Frequencies (3 chatters)
- The Rebecca Juro Show (3 chatters)
- BBQSuperStars (3 chatters)
- Bill Murray (3 chatters)
- Brain Injury Radio (3 chatters)
- Cage Side Submissions (3 chatters)
- We Built That Network (3 chatters)
- Underground Professor Radio (3 chatters)
- A New Day 4 Al Islam (2 chatters)
- Angels Of Light (2 chatters)
- entertainment-music-promotion- (2 chatters)
- Marlin Family Live (2 chatters)
- OPWR (2 chatters)
- Tarvino (1 chatters)
- GRAYMAN (1 chatters)
- EIE Save Our Children (1 chatters)
- JackNewtown (1 chatters)
- JADE Radio Network (1 chatters)
- Jay King Network (1 chatters)
- AOW Productions (1 chatters)
- Autistic People (1 chatters)
- African On The Move (1 chatters)
- and now for something completely (1 chatters)
- Champion Talk (1 chatters)
- The Wake Up Mission (1 chatters)