According to security studies, malware can remain in the network for up to 175 days before it strikes. In comparison it wouldn´t take that long for an employee to download the customer database on a weekend or terabytes of data from virtual machines in one night. When you finally notice insider threats like this, your company's most valuable know-how is already gone.
But how can you preventively detect and avoid such insider threats? What options do you have to analyze user activities based on individual behavior patterns? And how can you create automated protection that immediately responds to such insider attacks?
Daniel Döring, Technical Director Security at Matrix42, will demonstrate how to detect such security incidents in real time, but also how to set up cyber defense measurements that will act automatically. And most importantly, how to set up an individualized protection concept step by step based on analyses.