Gå frakoblet med Player FM -appen!
Episode 98: Transparency as a Tool to Combat Insider Threats
Manage episode 436616171 series 3382533
In episode 98 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.
Together, they embrace transparency as a vehicle for the cybersecurity industry to better defend against insider threats.
Here are some highlights from our episode:
- 01:28. How KnowBe4 detected an insider threat from North Korea
- 09:09. How the Center for Internet Security® (CIS®) responded to news of this incident
- 21:02. The role of technical controls in detecting these types of threats
- 23:56. Common signs you can use to detect fake employees in your hiring process
- 29:22. How cybersecurity companies can use this incident to improve their defenses
Resources
- How a North Korean Fake IT Worker Tried to Infiltrate Us
- North Korean Fake IT Worker FAQ
- Episode 77: Data's Value to Decision-Making in Cybersecurity
- Defense-in-Depth: A Necessary Approach to Cloud Security
- eBook: A CISO’s Guide to Bolstering Cybersecurity Posture
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
108 episoder
Manage episode 436616171 series 3382533
In episode 98 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.
Together, they embrace transparency as a vehicle for the cybersecurity industry to better defend against insider threats.
Here are some highlights from our episode:
- 01:28. How KnowBe4 detected an insider threat from North Korea
- 09:09. How the Center for Internet Security® (CIS®) responded to news of this incident
- 21:02. The role of technical controls in detecting these types of threats
- 23:56. Common signs you can use to detect fake employees in your hiring process
- 29:22. How cybersecurity companies can use this incident to improve their defenses
Resources
- How a North Korean Fake IT Worker Tried to Infiltrate Us
- North Korean Fake IT Worker FAQ
- Episode 77: Data's Value to Decision-Making in Cybersecurity
- Defense-in-Depth: A Necessary Approach to Cloud Security
- eBook: A CISO’s Guide to Bolstering Cybersecurity Posture
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
108 episoder
כל הפרקים
×Velkommen til Player FM!
Player FM scanner netter for høykvalitets podcaster som du kan nyte nå. Det er den beste podcastappen og fungerer på Android, iPhone og internett. Registrer deg for å synkronisere abonnement på flere enheter.