In today’s digital world, insider threats are more prevalent than ever, but not any less difficult to detect and deter. Whether they’re malicious or unintentional, they must be guarded against equally. While you can’t directly control human behavior, you can implement safeguards to protect, detect, and respond to insider threats.
Read more >
One of the best ways to address insider threats is to implement a formal insider threat program in your organization. But what does an effective program look like, and who should be involved in developing it?
If you’d like to learn more about preventing and detecting insider threats, join Delta Risk for this live 45-minute webinar. Our experts will discuss essential elements of an insider threat program, and why you need one now more than ever.
WHAT YOU’LL LEARN:
•Differences between malicious and unintentional insider threats
•Understanding the motivations of internal and external threat actors
•Real world examples of insider threats and organizational effects
•Elements to building an effective insider threat program
To develop an effective program, you need good cross communication and participation across various departments, including information technology, security, cyber security, legal, and human resource. There are many roles and subject matter experts within these departments and others (i.e., system or network administrator, security analyst, data or network architect, information assurance specialist, legal specialist, financial specialist, behavioral specialist, etc.) who should participate in your insider threat program, and who will benefit from this webinar.
ABOUT THE SPEAKERS
Mike Jansen is a Senior Consultant with Delta Risk with more than 14 years of experience in cyber security and cyber operations. He areas of expertise include computer network operations, network security, acquisition and life-cycle management, testing and evaluation, training, cyber security frameworks, and cyber security technical controls.