Ian Ahl, SVP of P0 Labs combed through the Rippling lawsuit and shared his findings and how it pertains to insider threats.
In this webinar, he breaks down how an alleged malicious insider searched for and exfiltrated data like sales pipeline and other sensitive information, and how security teams can better detect anomalous activity like this in their own environment.
In this 45-minute recording, you will learn:
How search logs can often show the clear intent of threat actors
Why insider threats often strongly resemble attacks orchestrated by advanced threat actor groups
How security teams can better monitor for anomalous behavior in their own environments to detect insider threats early
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home