The Key to Context: The Insider Threat Kill Chain
In this 7-part course, learn how to identify each stage of an insider threat attack.
In order to properly stop insider threats, organizations need to look at these incidents as full stories, not just an act of exfiltration that exists in a vaccuum. In this video course, Global Insider Threat Expert Katie Burnell will teach you the five stages that she has observed after investigating hundreds of insider threat attacks, what each of them entails, and what you need to look for in order to catch them before data is stolen.
Get a brief introduction to the insider threat kill chain, our host Katie, and what this course will cover.
The Insider Threat Kill Chain
What exactly is the insider threat kill chain, and why is it important?
Register to Play
Find out how to spot reconnaissance activity before an attack.
How do malicious insiders circumvent security tools to steal data?
Learn about aggregation, where the insider collects data they intend to steal.
Malicious insiders almost always cover their tracks, but there are signs you can find.
The big moment: The actual theft of data.
Let's recap - what have we learned, and how can you apply it?
Your Host: Katie Burnell, Insider Threat Expert
Katie is a cybersecurity expert and insider threat specialist who has held roles in public and private sector organizations, including the Bank of England. At Dtex, she analyzes user activity, conducts threat assessments, and communicates security risks to clients that include large global financial institutions, power suppliers, and government agencies. Katie is a qualified OSINT practitioner and Human Hacker, certified Investigative Interviewer, Maltego CTF champion, Social Engineering CTF champion and, Women in Cyber advocate, and a Dark Reading Women in Cybersecurity You Should Know.