У нас вы можете посмотреть бесплатно Beyond Identity and Access Management: Stop Insider Threats Webinar или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Insider threats aren’t just about a rogue employee, they’re just as often criminals abusing trusted identities after authentication. In this The Hacker News webinar, host James Azar sits down with Adam Koblentz, Field CTO at Reveal Security, to unpack why so many organizations stop monitoring at login, how that creates blind spots across SaaS applications, and what modern application-level detection & response looks like in practice. They discuss differentiating malicious insiders from compromised accounts, the limits of traditional controls (PAM, MFA, network/endpoint tools) in cloud and SaaS, and how behavioral analytics, modeling real user journeys within and across apps,can surface misuse or abuse early to prevent data leakage and theft. What you’ll learn Why “valid credentials ≠ legitimate user” (and how to prove it) Practical signals to monitor after authentication (privileged actions, mailbox access, unusual sequences, bulk operations, risky integrations) How behavior analytics and user-journey modeling separate normal work from abuse across apps like M365 and Salesforce Where PAM, MFA, EDR/NDR/XDR stop, and how Application Detection & Response (ADR) fills the gap A pragmatic approach for security leaders: start with visibility, baseline human + machine identities, reduce alert noise, measure outcomes Speakers • James Azar, Host, The Hacker News • Adam Koblentz, Field CTO, Reveal Security Learn more about Reveal Website: www.reveal.security LinkedIn: www.linkedin.com/company/revealsecurity Request a demo: https://www.reveal.security/request-a...