About
As remote work becomes the norm, a new threat vector has emerged—threat actors posing as legitimate employees. This session pulls back the curtain on how bad actors infiltrate organizations by passing background checks through human mules, embedding themselves in the workforce, and launching attacks from within. Based on lesser-known details from high-profile breaches, this talk will reveal how these schemes unfold and how organizations can detect and prevent them.
In this session you will:
- Uncover the tactics threat actors use to impersonate remote employees and bypass vetting
- Examine real-world case studies and breach insights involving insider imposters
- Learn practical strategies to identify and respond to imposters before and after they gain access