Go offline with the Player FM app!
Episode 98: Transparency as a Tool to Combat Insider Threats
Manage episode 436616171 series 3382533
In episode 98 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.
Together, they embrace transparency as a vehicle for the cybersecurity industry to better defend against insider threats.
Here are some highlights from our episode:
- 01:28. How KnowBe4 detected an insider threat from North Korea
- 09:09. How the Center for Internet Security® (CIS®) responded to news of this incident
- 21:02. The role of technical controls in detecting these types of threats
- 23:56. Common signs you can use to detect fake employees in your hiring process
- 29:22. How cybersecurity companies can use this incident to improve their defenses
Resources
- How a North Korean Fake IT Worker Tried to Infiltrate Us
- North Korean Fake IT Worker FAQ
- Episode 77: Data's Value to Decision-Making in Cybersecurity
- Defense-in-Depth: A Necessary Approach to Cloud Security
- eBook: A CISO’s Guide to Bolstering Cybersecurity Posture
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].
133 episodes
Manage episode 436616171 series 3382533
In episode 98 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.
Together, they embrace transparency as a vehicle for the cybersecurity industry to better defend against insider threats.
Here are some highlights from our episode:
- 01:28. How KnowBe4 detected an insider threat from North Korea
- 09:09. How the Center for Internet Security® (CIS®) responded to news of this incident
- 21:02. The role of technical controls in detecting these types of threats
- 23:56. Common signs you can use to detect fake employees in your hiring process
- 29:22. How cybersecurity companies can use this incident to improve their defenses
Resources
- How a North Korean Fake IT Worker Tried to Infiltrate Us
- North Korean Fake IT Worker FAQ
- Episode 77: Data's Value to Decision-Making in Cybersecurity
- Defense-in-Depth: A Necessary Approach to Cloud Security
- eBook: A CISO’s Guide to Bolstering Cybersecurity Posture
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].
133 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.