WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

DTEX Winter Virtual Briefing Series Presents Insider Risk Trends and Solutions

As cybersecurity trends develop for 2022, there continues to be a myriad of topics to focus on and things to think about within your security programs that will protect your organization from never-ending cyber threats. DTEX Systems’ insider risk management expertise and technology remain a strong resource for you, by breaking down what’s happening in the market, the latest technologies, and real research from the field by the DTEX i3 research team.

Our Winter Briefing Series is a great way to learn more about insider threat management, UEBA, DLP, UAM, and the overall Insider Risk Ecosystem. The webinars below will explore these topics and more and give you a chance to talk directly with our team. We hope you join us on one (if not all!) of the webinars to see what it’s all about and hopefully clarify your strategy for the year and beyond.

Embracing the Human Firewall—The Convergence of UEBA, DLP, and UAM
January 27th, 2022 | 12PM ET
Presenter: Rajan Koo, DTEX Systems
Q&A Moderator: Andy London, DTEX Systems

Here’s what we’ve learned in the last 20 months as the Remote Age of work has taken a firm grip on each and every one of our organizations: Humans are the New Firewall. This forced reality has also made it crystal clear that past and present technologies designed to protect humans and secure data are not working as intended or force multipliers for the other. It’s time for a new approach, one that leverages what we’ve learned and what works to empower humans as shepherds of enterprise security, not suspects.

Join Rajan Koo, Chief Customer Officer with DTEX Systems, as he explores the realities of the Remote Work Age, including the:
• Dichotomies of Innovation and Risk
• Balance of enterprise expectations, employee empowerment, and data security
• Strengths and weaknesses of DLP, Insider Threat, UAM and UEBA technologies
• Opportunity to protect personal privacy
• Best practices available to IT, cyber, risk, compliance, and fraud teams to embrace the Human Firewall

REGISTER NOW

A New Threat Emerges—The Super Malicious Insider
February 15, 2022 | 12PM ET
Presenters: Armaan Mahbod and Rajan Koo, DTEX Systems

As the Work-From-Anywhere environment continues to evolve, it has given rise to a new persona: the Super Malicious Insider. One with superior technical skills, an in-depth knowledge of common insider threat detection techniques, and the opportunity to cause serious damage to your organization.

How do these individuals differ from other malicious insiders, or employees just trying to do their jobs? In our latest threat report, written by the DTEX i3 research team, “2022 Insider Risk Intelligence & Investigations Report: Psycho-Social Behaviors, Remote Work & the Rise of The Super Malicious Insider” we discuss the nuances between an insider risk and an insider threat, why current technology falls short of providing useful data, and how remote work puts organizations at higher risk than ever before.

Register now for our upcoming webinar, where you’ll learn:
• Insider Risk vs. Insider Threat
• How to spot a Super Malicious Insider based on behavioral data and context
• Real-world examples discovered through research by the DTEX i3 team
• Steps to secure your organization in 2022 and beyond

REGISTER NOW

The Insider Risk Ecosystem—Completing the Puzzle for the Digital & Distributed Enterprise
March 15th, 2022 | 12PM ET
Presenters: Rajan Koo, DTEX Systems and others

No one wins alone. Isn’t that how the saying goes? The same is true for mitigating insider-born risks and thwarting malicious internal actors. Unfortunately, investments in anti-phishing technologies, security awareness training, and UEBA tools have done little to stem the tide of data loss, internal fraud, and privileged user compromise. It’s time to bring insider risk and intent intelligence into the fold for real.

Join us to learn:
• Where Insider Risk fits in your cyber security architecture
• What technologies are super-charged by Insider Risk technologies
• How to assess Insider Risk platforms: features & capabilities
• The common mistakes SOC teams make when adopting Insider Risk tools

The seminar will conclude with a demonstration of DTEX InTERCEPT integrations with Splunk, CrowdStrike, Help Systems, and Zscaler to showcase insider risk intelligence as a value multiplier for security operations and risk management.

REGISTER NOW