See the startling results of meticulous analysis of hundreds of real-life insider attacks from the team at Carnegie Mellon University, where the CERT (Computer Emergency Response Team) function was created. The analysis results clearly indicate that, contrary to the majority of headlines, stealthy insiders pose a huge fraud risk to organizations, flying far under the radar for extended periods of time. These insiders are often senior, trusted staff with privileged access to accounts and valuable data. Alternately, innocent employees become pawns when they fall victim to social engineering or targeted attacks that lead to fraud. Learn which new technologies enable the detection of anomalous behavior patterns often before actual fraud even occurs. The following questions will also be answered:
See Also: Threat Intelligence - Hype or Hope?
- How can I predict and/or detect an internal attack?
- What is the ratio of internal to external fraud attacks and their associated value?
- What types of attacks do internal actors carry out and why?
Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.