Exfiltration Vectors

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
12 minutes
Difficulty
Beginner
CEU/CPE
1
Video Transcription
00:07
if you haven't heard already. Welcome to the collaboration Age.
00:11
Collaboration tools are great, and data has never been more portable
00:16
in an open, collaborative work environment, employees or not, change of their desk from 9 to 5 Monday through Friday. They have flexible work schedules, flexible work locations, employees can upload files to the Web, sync data to personal cloud accounts,
00:31
email file attachments and even share files publicly from corporate cloud storage accounts.
00:39
And there in lies, the risk,
00:42
while great for productivity, collaboration tools decentralized the data that's traditionally created, secured and backed up in the data center.
00:52
And the risks to that data is magnified because the very tools that workers used to collaborate are now some of the most popular ex filtration vectors for moving data out of an organization.
01:04
On top of that, the influx of dual use personal and business products like Gmail Slack, Google Drive and one drive Onley increased the complexity of this issue,
01:18
and, sure, you could try to block them all. But when security teams block one vector, users simply find another.
01:26
And how do you distinguish between sanctioned and unsanctioned one drive behavior?
01:32
How can you block personal Gmail. If the corporate email product is Gmail,
01:38
regardless of insiders air acting maliciously or putting data at risk accidentally, an insider threat program will need to take these vectors into account.
01:49
And where traditional cybersecurity focused on prevention,
01:53
that's no longer enough.
01:55
Instead, a robust cybersecurity program needs to focus on detecting and responding to risk from everywhere outside and inside.
02:06
Oh, in case you were wondering the traditional ex filtration vectors,
02:10
Yeah, those are still there.
02:13
However, ex filtration vectors aren't the only consideration for a modern insider threat program.
02:20
Check out our other videos to learn more about the wise and what's before we tackle the house.
Up Next
Building a Modern Insider Threat Program

In this course brought to you by industry leader Code42, you will learn their respective frameworks on how to construct an effective enterprise insider threat program to protect your company from the inside out.

Instructed By