Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Comment améliorer la gestion des droits et de l'accès aux données [French] Anthony Moillic, Field CISO EMEA&APAC L'accès et les droits d'accès aux données sont excessifs, et la gestion en est complexe et sujette aux erreurs. La localisation des données sensibles ... 2 months ago | 52 mins Countering Supply Chain Attacks: Where next? Benoit Heynderickx - Principal Analyst, ISF, and Elli Tsiala - Product Owner, Third Party Security Risk Management, ABN AMRO Supply chain attacks are high on the agenda of the board, but there are no easy fixes to a growing challenge. How do you secure your organisation agai... 4 months ago | 51 mins Human-Centred Security: Positively influencing security behaviour Daniel Norman, Senior Solutions Analyst, ISF Human error and negligence still contribute to a significant number of security incidents, yet current approaches to mitigating this risk are failing ... 2 years ago | 45 mins Your people are not as secure as you think Hilary Walton, CISO, Kordia Group Independent research commissioned by Aura Information Security reveals staff are not as secure as their managers may think. While 62 percent of New Ze... 2 years ago | 31 mins Pourquoi les outils de sécurité d'ancienne génération ne font pas le poids Jean-philippe Guy & Adil Hassouni, Cybersecurity Specialists, Proofpoint France Pourquoi les outils de sécurité d'ancienne génération ne font pas le poids face aux menaces internes De nos jours, les risques internes et la prévent... 2 years ago | 35 mins Five Steps to Building an Effective Insider Threat Program Brandon Dunlap, Moderator, (ISC)², Simon Sharp, VP International, ObserveIT The greatest cybersecurity threat an organisation faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders ... 4 years ago | 59 mins Protecting Data In The Age Of Insider Threats Neil Thacker Deputy CISO Forcepoint and Mike Smart Director - Product & Solutions Forcepoint Join Forcepoint experts as they discuss the key ingredients of a truly effective insider threat programme. Find out how real-time security intellige... 7 years ago | 59 mins Comment traiter les menaces internes grâce à l'approche centrée sur le personne Gaëtan Gesret, Systems Engineer, Proofpoint France Les menaces internes sont à l'origine de vols de données à hauteur de trois millions d'enregistrements par jour en moyenne. Elles ont également été la... 3 years ago | 75 mins How to Prevent Internal Data Leaks and Protect Personal Data Jamie Manuel, VP of Product Management, Titus Personal data privacy is becoming a bigger priority in the enterprise and we all bear responsibility for safeguarding our employees, customers, partne... 3 years ago | 49 mins Improving cyber risk conversations with the Board Simon Marvell, Partner, Acuity Risk Management According to McKinsey most IT and security executives use manually compiled spreadsheets to report cyber risk data to their Boards; unsurprisingly man... 3 years ago | 48 mins