September 14, 2016 2 PM ET
ITAC Reg Link: http://gtec.talkingbluntly.com/ibm0914?LeadSource=ITAC
Client data is rapidly increasing in value—for organizations and cyber criminals alike. To effectively protect clients and corporate reputations, organizations including governments must take steps to mitigate ever-evolving cyber threats—to limit both their legal liability and public exposure.
But while most organizations spend a vast amount of their defense efforts to repel external attacks such as phishing, malware and distributed denial-of-service (DDoS), many are leaving themselves open to an equally-damaging form of threat: insider attacks. These types of attacks, committed by employees, third-party contractorsand partners, make up more than half of data breaches, according to the 2015 Cyber Security Intelligence Index, and are capable of penetrating otherwise-secure database structures.
In this upcoming GTEC webinar, together with our sponsor IBM, we will explore:
- The key insider threats affecting your data assets,
- The differences between protected and unprotected databases, and
- Concrete strategies to effectively defend your data.
When it comes to defending your organization from internal cyber attacks, time is of the essence. Join us on Wednesday, September 14 to uncover the information you need to develop a truly secure cyber strategy.