{"id":34907,"date":"2023-11-02T01:22:19","date_gmt":"2023-11-02T08:22:19","guid":{"rendered":"https:\/\/www.syteca.com\/?post_type=resources&#038;p=34907"},"modified":"2023-12-14T06:15:16","modified_gmt":"2023-12-14T13:15:16","slug":"kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats","status":"publish","type":"resources","link":"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats","title":{"rendered":"KuppingerCole and Syteca Webinar: The Anatomy of Insider Threats"},"content":{"rendered":"\n\t\t<div  class=\"block-4e9c6b16-1f04-4e93-8fda-5a959b89eee0 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-55964205-c482-48bc-a37f-829bdd2155fd areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-56e8af5f-6b24-4e78-9d61-5305f18972ea row areoi-element align-items-center\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div id=\"breadcrumbs\" class=\"block-b514dd46-7047-46a4-89f2-34f10db3d577 col areoi-element resource-breadcrumbs col-sm-12\">\n\t\t\t\n\t\t\t\n<div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/www.syteca.com\/en\/resources\/%resource_category%\">Resources<\/a><\/span> &gt; <span><a href=\"https:\/\/www.syteca.com\/en\/resources\/webinars\">Webinar<\/a><\/span> &gt; <span class=\"breadcrumb_last\" aria-current=\"page\">KuppingerCole and Syteca Webinar: The Anatomy of Insider Threats<\/span><\/span><\/div>\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-c63f40d7-581f-4c7c-bb00-b02a745a4911 col areoi-element col-12 col-lg-6 col-xl-6\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-center text-lg-start has-text-color\" style=\"color:#4790ea;font-size:17px;font-style:normal;font-weight:600\">Webinar<\/p>\n\n\n\n<h1 class=\"wp-block-heading text-center text-lg-start\">The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions<\/h1>\n\n\n\n<p><\/p>\n\n\n\n<p>We are excited to announce our new joint webinar with KuppingerCole`s&nbsp; expert!&nbsp;<\/p>\n\n\n\n<p>By participating in this webinar, you will:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Gain an understanding of insider threats and their implications for financial institutions.&nbsp;<\/li>\n\n\n\n<li>Win best practices for creating a robust insider threat program.<\/li>\n\n\n\n<li>Discover how to manage privileged access, monitor subcontractors and terminal servers, meet compliance requirements, and audit user activities effectively.<\/li>\n\n\n\n<li>Stay ahead of the curve in protecting your institution from internal threats that can have devastating consequences.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-group block-share-social-buttons align-items-lg-start is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-4b2eccd6 wp-block-group-is-layout-flex\">\n<p class=\"p-poppins mb-2\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Share:<\/p>\n\n\n\n<ul class=\"wp-block-social-links has-icon-color has-icon-background-color ms-2 ms-lg-0 is-layout-flex wp-block-social-links-is-layout-flex\"><li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-linkedin  mx-2 mx-lg-0 wp-block-social-link\"><a rel=\"http:\/\/www.linkedin.com\/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwhite-papers%2Fhow-to-manage-insider-risks-in-banking-and-finance%2F&amp;title= noopener nofollow\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwebinars%2Fkuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats&#038;title=\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-facebook  mx-2 mx-lg-0 wp-block-social-link\"><a rel=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwhite-papers%2Fhow-to-manage-insider-risks-in-banking-and-finance%2F noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwebinars%2Fkuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-twitter  mx-2 mx-lg-0 wp-block-social-link\"><a rel=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwhite-papers%2Fhow-to-manage-insider-risks-in-banking-and-finance%2F&amp;text= noopener nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwebinars%2Fkuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats&#038;text=\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M22.23,5.924c-0.736,0.326-1.527,0.547-2.357,0.646c0.847-0.508,1.498-1.312,1.804-2.27 c-0.793,0.47-1.671,0.812-2.606,0.996C18.324,4.498,17.257,4,16.077,4c-2.266,0-4.103,1.837-4.103,4.103 c0,0.322,0.036,0.635,0.106,0.935C8.67,8.867,5.647,7.234,3.623,4.751C3.27,5.357,3.067,6.062,3.067,6.814 c0,1.424,0.724,2.679,1.825,3.415c-0.673-0.021-1.305-0.206-1.859-0.513c0,0.017,0,0.034,0,0.052c0,1.988,1.414,3.647,3.292,4.023 c-0.344,0.094-0.707,0.144-1.081,0.144c-0.264,0-0.521-0.026-0.772-0.074c0.522,1.63,2.038,2.816,3.833,2.85 c-1.404,1.1-3.174,1.756-5.096,1.756c-0.331,0-0.658-0.019-0.979-0.057c1.816,1.164,3.973,1.843,6.29,1.843 c7.547,0,11.675-6.252,11.675-11.675c0-0.178-0.004-0.355-0.012-0.531C20.985,7.47,21.68,6.747,22.23,5.924z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Twitter<\/span><\/a><\/li><\/ul>\n<\/div>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div style=\"--bs-bg-opacity:0\"  class=\"block-23908a0e-8976-4292-b0cb-78c14770eb79 col areoi-element block-white-papers-form col-12 col-lg-6   bg-body\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 234,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-f504a026-f7ed-4d90-ae80-63c7ae04e5f2 areoi-element hs-white-pares-form pb-3\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    region: \"na1\",\n    portalId: \"612026\",\n    formId: \"165c6eef-c94d-4d9b-af49-1b30e9fef2e2\",\n    onFormSubmitted: function($form) {\n      $('.wp-embed-aspect-16-9').css(\"display\", \"block\");\n\t\t\t}\n  });\n<\/script>\n\n\n\n\t\t<div  class=\"block-6bc7c832-c5dd-4506-9c25-31e7df4d1503 areoi-element div-round\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\" style=\"display:none\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"ratio ratio-16x9\"><iframe title=\"The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/KGObdFWtpK4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t","protected":false},"featured_media":34915,"menu_order":0,"template":"","class_list":["post-34907","resources","type-resources","status-publish","has-post-thumbnail","hentry","resource_category-webinars"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>KuppingerCole and Syteca Webinar: The Anatomy of Insider Threats | Syteca<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"KuppingerCole and Syteca Webinar: The Anatomy of Insider Threats | Syteca\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-14T13:15:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/11\/01030059\/2023_Webinar_Aatnomy-of-insider-threat-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2083\" \/>\n\t<meta property=\"og:image:height\" content=\"1173\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats\",\"url\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats\",\"name\":\"KuppingerCole and Syteca Webinar: The Anatomy of Insider Threats | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/11\/01030059\/2023_Webinar_Aatnomy-of-insider-threat-1.jpg\",\"datePublished\":\"2023-11-02T08:22:19+00:00\",\"dateModified\":\"2023-12-14T13:15:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/11\/01030059\/2023_Webinar_Aatnomy-of-insider-threat-1.jpg\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/11\/01030059\/2023_Webinar_Aatnomy-of-insider-threat-1.jpg\",\"width\":2083,\"height\":1173,\"caption\":\"The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Resources\",\"item\":\"https:\/\/www.syteca.com\/en\/resources\/%resource_category%\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinar\",\"item\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"KuppingerCole and Syteca Webinar: The Anatomy of Insider Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"KuppingerCole and Syteca Webinar: The Anatomy of Insider Threats | Syteca","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats","og_locale":"en_US","og_type":"article","og_title":"KuppingerCole and Syteca Webinar: The Anatomy of Insider Threats | Syteca","og_url":"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats","og_site_name":"Syteca","article_modified_time":"2023-12-14T13:15:16+00:00","og_image":[{"width":2083,"height":1173,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/11\/01030059\/2023_Webinar_Aatnomy-of-insider-threat-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats","url":"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats","name":"KuppingerCole and Syteca Webinar: The Anatomy of Insider Threats | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/11\/01030059\/2023_Webinar_Aatnomy-of-insider-threat-1.jpg","datePublished":"2023-11-02T08:22:19+00:00","dateModified":"2023-12-14T13:15:16+00:00","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/11\/01030059\/2023_Webinar_Aatnomy-of-insider-threat-1.jpg","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/11\/01030059\/2023_Webinar_Aatnomy-of-insider-threat-1.jpg","width":2083,"height":1173,"caption":"The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions"},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/kuppingercole-and-ekran-system-webinar-the-anatomy-of-insider-threats#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Resources","item":"https:\/\/www.syteca.com\/en\/resources\/%resource_category%"},{"@type":"ListItem","position":2,"name":"Webinar","item":"https:\/\/www.syteca.com\/en\/resources\/webinars"},{"@type":"ListItem","position":3,"name":"KuppingerCole and Syteca Webinar: The Anatomy of Insider Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/resources\/34907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/resources"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/34915"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=34907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}