Hi [[ session.user.profile.firstName ]]

When Insiders Go Rogue: Tactics for Monitoring and Containing Breaches

If today’s headlines about compromised enterprises are any indication, an insider data breach can cost a single organization as much as tens of millions of dollars. Another significant financial impact to an organization is the remediation cost that follows breach detection. This highly relevant Web
If today’s headlines about compromised enterprises are any indication, an insider data breach can cost a single organization as much as tens of millions of dollars. Another significant financial impact to an organization is the remediation cost that follows breach detection. This highly relevant Webinar that has been designed to help companies better understand the scope of insider threats and glean best practices for monitoring and containing breaches.

You will learn:
· The sources of insider threats, both careless employee behavior or malicious actions, and how to recognize them in your organization.

· Best practices for monitoring high-risk users and anomalous behavior to identify possible breaches before they become large scale.

· Reporting metrics to monitor the business threats and ensuring incident response processes are in place to quickly remediate any breach.
Recorded Mar 15 2012
49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Morris Hicks - Senior Director, Services Engineering – HP Enterprise Security
Presentation preview: When Insiders Go Rogue: Tactics for Monitoring and Containing Breaches
Recommended for you:
  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: When Insiders Go Rogue: Tactics for Monitoring and Containing Breaches
  • Live at: Mar 15 2012 9:00 pm
  • Presented by: Morris Hicks - Senior Director, Services Engineering – HP Enterprise Security
  • From:
Your email has been sent.
or close
You must be logged in to email this