ONLINE COURSE

Remote Workers 101

Top 10 Things to Keep Track of

The global scramble to establish or expand remote working is creating an unprecedented opportunity for attackers. Since most data breaches stem from inappropriate user behavior and excessive user permissions, it’s more important than ever to be able to closely monitor the behavior of your users and quickly spot suspicious actions, as well as to be able to identify your most sensitive assets and secure them by adhering to the least-privilege principle.

Detecting Insider Threats

While IT teams are busy trying to figure out how to keep the wheels turning, threat actors are seeking to exploit the “work from home” situation. Most often, the root cause of security incidents is non-malicious but negligent end users. However, disgruntled employees can also take advantage of economic and societal uncertainty to strike. It’s up to IT pros to understand the techniques attackers use, educate their users about how to avoid common traps, and put tools and processes in place to promptly detect insider threats and avoid breaches.

In this webinar, we will walk you through:

  • Best practices for preventing data leakage, given users’ tendency to prioritize convenience over security
  • Ways to identify covert attacks by monitoring VPN logon attempts and detecting suspicious activity in cloud applications
  • 5 things you have to keep a close eye to detect abnormal user behavior, and how Netwrix functionality can help

Webinar Presenters

Ilia Sotnikov avatar
Ilia Sotnikov
Vice President, Product Management

Ilia is driving product innovation and strategy at Netwrix. His technical background is extensive in the areas of Security, Identity and Access Management, Vulnerability Assessment, Regulatory Compliance, SaaS and Cloud Computing. Ilia has over 15 years of experience in IT management software market. 

Adam Stetson avatar
Adam Stetson
Solutions engineer

Adam has over 10 years of experience in the IT field performing Active Directory migrations, integrations and installations for various businesses. Adam now helps organizations strengthen IT security, streamline compliance and optimize operations.

Get Free Webinar Series
We care about the security of your data. Please see our Privacy Policy
Register for the webinar
Detecting Insider Threats
We care about the security of your data. Please see our Privacy Policy
Register for the webinar
Breaking Off Cybercriminals' Plans
We care about the security of your data. Please see our Privacy Policy
Get Free Webinar Series
We care about the security of your data. Please see our Privacy Policy