By Roark Pollock

Threat Hunting Scenario: Monitoring for Insider Data Exfiltration

About this webinar

Industry statistics point to 1 in 5 enterprise breaches involve insider actions. Insider threats are often the costliest and most disruptive to an enterprise – even highly secure enterprises (think Edward Snowden). According to the FBI, “the thief who is harder to detect and who could cause the most damage is the insider—the employee with legitimate access.”


  • Al Hartmann, Chief Scientist at Ziften
  • Josh Harriman, VP of Cyber Security Intelligence at Ziften
Get the Webinar Here

Watch Now