Chuyển sang chế độ ngoại tuyến với ứng dụng Player FM !
Episode 98: Transparency as a Tool to Combat Insider Threats
Manage episode 436616171 series 3382533
In episode 98 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.
Together, they embrace transparency as a vehicle for the cybersecurity industry to better defend against insider threats.
Here are some highlights from our episode:
- 01:28. How KnowBe4 detected an insider threat from North Korea
- 09:09. How the Center for Internet Security® (CIS®) responded to news of this incident
- 21:02. The role of technical controls in detecting these types of threats
- 23:56. Common signs you can use to detect fake employees in your hiring process
- 29:22. How cybersecurity companies can use this incident to improve their defenses
Resources
- How a North Korean Fake IT Worker Tried to Infiltrate Us
- North Korean Fake IT Worker FAQ
- Episode 77: Data's Value to Decision-Making in Cybersecurity
- Defense-in-Depth: A Necessary Approach to Cloud Security
- eBook: A CISO’s Guide to Bolstering Cybersecurity Posture
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
107 tập
Manage episode 436616171 series 3382533
In episode 98 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.
Together, they embrace transparency as a vehicle for the cybersecurity industry to better defend against insider threats.
Here are some highlights from our episode:
- 01:28. How KnowBe4 detected an insider threat from North Korea
- 09:09. How the Center for Internet Security® (CIS®) responded to news of this incident
- 21:02. The role of technical controls in detecting these types of threats
- 23:56. Common signs you can use to detect fake employees in your hiring process
- 29:22. How cybersecurity companies can use this incident to improve their defenses
Resources
- How a North Korean Fake IT Worker Tried to Infiltrate Us
- North Korean Fake IT Worker FAQ
- Episode 77: Data's Value to Decision-Making in Cybersecurity
- Defense-in-Depth: A Necessary Approach to Cloud Security
- eBook: A CISO’s Guide to Bolstering Cybersecurity Posture
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
107 tập
Todos los episodios
×Chào mừng bạn đến với Player FM!
Player FM đang quét trang web để tìm các podcast chất lượng cao cho bạn thưởng thức ngay bây giờ. Đây là ứng dụng podcast tốt nhất và hoạt động trên Android, iPhone và web. Đăng ký để đồng bộ các theo dõi trên tất cả thiết bị.