The Key to Context: The Insider Threat Kill Chain – Video Course

VIDEO COURSE
The Key to Context: The Insider Threat Kill Chain

In this 7-part course, learn how to identify each stage of an insider threat attack.

In order to properly stop insider threats, organizations need to look at these incidents as full stories, not just an act of exfiltration that exists in a vaccuum. In this video course, Global Insider Threat Expert Katie Burnell will teach you the five stages that she has observed after investigating hundreds of insider threat attacks, what each of them entails, and what you need to look for in order to catch them before data is stolen.

0

Introduction

Get a brief introduction to the insider threat kill chain and what this course will cover.

1:09

PLAY

1

The Insider Threat Kill Chain

What exactly is the insider threat kill chain, and why is it important?

4:39

Register to Play

2

Reconnaissance

Find out how to spot reconnaissance activity before an attack.

8:26

Register to Play

3

Circumvention

How do malicious insiders circumvent security tools to steal data?

6:22

Register to Play

4

Aggregation

Learn about aggregation, where the insider collects data they intend to steal.

TBA

Coming Soon

5

Obfuscation

Malicious insiders almost always cover their tracks, but there are signs you can find.

TBA

Coming Soon

6

Exfiltration

The big moment: The actual theft of data.

TBA

Coming Soon

7

Conclusion

Let's recap - what have we learned, and how can you apply it?

TBA

Coming Soon

Register Now

Featuring Insights from Insider Threat Experts

This course was developed using field insights from our Insider Threat Experts and was co-authored by Katie Burnell, a cybersecurity expert and insider threat specialist who has held roles in public and private sector organizations, including the Bank of England. Katie is a qualified OSINT practitioner and Human Hacker, certified Investigative Interviewer, Maltego CTF champion, Social Engineering CTF champion and, Women in Cyber advocate, and a Dark Reading Women in Cybersecurity You Should Know.