The Key to Context: The Insider Threat Kill Chain
In this 7-part course, learn how to identify each stage of an insider threat attack.
In order to properly stop insider threats, organizations need to look at these incidents as full stories, not just an act of exfiltration that exists in a vaccuum. In this video course, Global Insider Threat Expert Katie Burnell will teach you the five stages that she has observed after investigating hundreds of insider threat attacks, what each of them entails, and what you need to look for in order to catch them before data is stolen.
Get a brief introduction to the insider threat kill chain and what this course will cover.
The Insider Threat Kill Chain
What exactly is the insider threat kill chain, and why is it important?
Register to Play
Find out how to spot reconnaissance activity before an attack.
Register to Play
How do malicious insiders circumvent security tools to steal data?
Learn about aggregation, where the insider collects data they intend to steal.
Malicious insiders almost always cover their tracks, but there are signs you can find.
The big moment: The actual theft of data.
Let's recap - what have we learned, and how can you apply it?
Featuring Insights from Insider Threat Experts
This course was developed using field insights from our Insider Threat Experts and was co-authored by Katie Burnell, a cybersecurity expert and insider threat specialist who has held roles in public and private sector organizations, including the Bank of England. Katie is a qualified OSINT practitioner and Human Hacker, certified Investigative Interviewer, Maltego CTF champion, Social Engineering CTF champion and, Women in Cyber advocate, and a Dark Reading Women in Cybersecurity You Should Know.