Events Calendar

The Insider Threat
Tuesday 09 May 2017, 09:30am - 05:00pm
Hits : 892
by This email address is being protected from spambots. You need JavaScript enabled to view it.

iNSIDE THREAT2


The Insider Threat and combining enhanced Fraud with Cyber:
Attribution, detection, management and prevention

The greatest cyber threat to the security of companies and government is not the hacker attacking from beyond network walls. It is the insiders already within those walls, and equipped with an all-access pass. A malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems. The threat may involve fraud, the theft of confidential or commercially valuable information, the theft of intellectual property, or the sabotage of computer systems. On another note, the overwhelming part of the threats and incidents are unintentional, originating from unaware IT- users and employees and leading to accidental data loss. An integrated, holistic and risk-oriented approach is required, to prevent the data breach from the compromised insider, stop the malicious insider and block accidental data loss

Despite this known and expanding risk from insiders, there is little attention paid to this issue. There is an overall lack of knowledge of insider threats, and the public and private sector cannot share what they do not know.

What are the main personnel issues, including cyber security challenges and capabilities? How to implement a solid insider threat management process? How do we deal with ethical and privacy considerations versus monitoring capabilities? What are best practices, approaches and solutions available to combat the threat from the inside?

These topics and more have been covered on Tuesday, 9 May 2017 in Brussels.

 

Session Materials :

 

Materials are now available for download. Attending to the event was free, but we charge a minor fee for the materials in order to ensure some income for the organization. As a non-profit organization, due to tax reasons, a small charge is asked to cater for the incurred costs. You will be transferred to Payloadz.com and be asked to pay for 121 € (100 € excl, 21% VAT). You will be able to receive an invoice if you leave your company details and PO number. Once paid, you will receive a downloadlink to download the .zip with all materials. 

 

LSEC continues to support creating awareness on information security, will try to lower the barrier for ict security professionals. With this mechanism, all attendees have evaluated the value of the presented materials and can easily contribute to the future activities. 

 



Preliminary Agenda:

09.30 : Welcome & Registration
10.00 : Introduction by Ulrich Seldeslachts, CEO LSEC 
Setting the scene and introducing the speakers and the agenda of the day.

Morning Program - Insider Challenges Debate :

  • 10.15 : KPMG, Hilde De Cremer and Tim van Baelen
  • 11.00 : ObserveIT, Arik Kasha (tbc)
  • 11.30 : BAE Systems: Insider fraud, by Bulent Teksoz, Cyber Security Strategist, BAE Systems
  • 12.10 : panel debate
  • 12.30 : lunch

 

Afternoon Program - Insider Challenges Solutions Debate :
During this part, all technology providers provide a short and condensed overview of their perspective of the challenge and how they tackle it from their perspective, followed by a broad debate amongst participants in a panel discussion relating to that variety and complexity of challenges and how to provide an integrated perspective.

  • 13.15 : KPMG, Joris Weyn : insider threat from a holistic perspective
  • 13.30 : How to detect/control the roaming insider using corporate SaaS to leak data? Stijn Rommens, Director Systems Engineering, Cloud Security at Symantec
  • 14.00 : Detection Technical perspectives overview and considerations - detection, (user) behavioral analysis : Toreon, Dieter Sarrazyn
  • 14.30 : Discovering Rogue Identities : Brainwave, Guy  Duray

15.00 : Coffee Break

  • 15.30 : Privileged User management in a IAM analytics environment, Rudy Desouza from Quest – One Identity
  • 16.00 : monitoring detection capabilities via SIEM : IBM, Q-Radar and Watson insights, by Johan Dieltjens from IBM
  • 16.30 : debate and discussion

Session Materials :

 

Materials are now available for download. Attending to the event was free, but we charge a minor fee for the materials in order to ensure some income for the organization. As a non-profit organization, due to tax reasons, a small charge is asked to cater for the incurred costs. You will be transferred to Payloadz.com and be asked to pay for 121 € (100 € excl, 21% VAT). You will be able to receive an invoice if you leave your company details and PO number. Once paid, you will receive a downloadlink to download the .zip with all materials. 

LSEC continues to support creating awareness on information security, will try to lower the barrier for ict security professionals. With this mechanism, all attendees have evaluated the value of the presented materials and can easily contribute to the future activities. 

Practical Details :

The Insider Threat
Tuesday 9 May 2017 from 09.30am-5pm
BluePoint Brussels, 80 Bd A. Reyers Ln, 1030 Brussels, Belgium


Registration is now closed.

 

 

LSEC for Security Professionals

lsec-prof

LSEC for Security Companies

lsec-com

 

LSEC for enterprise & government

lsec-gov

 

LSEC for academia & research institutes

lsec-research

Request information about LSEC Membership

Click here

Sign up for our newsletter

Click here

Learn more about current projects & industry collaborations

Click here

Contact us

Click here

logo-acdcec

Privacy | Disclaimer | Responsible Disclosure Copyright LSEC - Leaders In Security 2002 - 2017 - Kasteelpark 10, 3001 Heverlee - Leuven | tel. +32.16.32.85.41