As remote work becomes the norm, a new threat vector has emerged—threat actors posing as legitimate employees. This session pulls back the curtain on how bad actors infiltrate organizations by passing background checks through human mules, embedding themselves in the workforce, and launching attacks from within. Based on lesser-known details from high-profile breaches, this talk will reveal how these schemes unfold and how organizations can detect and prevent them.
In this session you will:
Uncover the tactics threat actors use to impersonate remote employees and bypass vetting
Examine real-world case studies and breach insights involving insider imposters
Learn practical strategies to identify and respond to imposters before and after they gain access
This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.