The Secrets to an Effective Insider Threat Program

Logo
Presented by

Nathaniel Ford, Moderator, (ISC)² EMEA, Mayank Choudhary, Vice President, Observe IT

About this talk

With three million records stolen every day, insider threats are quickly becoming the greatest cybersecurity threat organisations face today. Unfortunately, the most trusted people - contractors, vendors, privileged users and business users - often create the most risk. Whether insider threats are unintentional or malicious, the secret to quickly identifying and eliminating them starts with a people-centric approach. Attend this webinar to learn best practices for building and maintaining an effective insider threat program. You will learn: - Why insider threats are prevalent, despite many organizations implementing a layered defense approach - How to stop insider threats in their tracks, through comprehensive visibility, real time intelligence and policy enforcement - Why you need to focus on people, process and technology, in that order
Related topics:

More from this channel

Upcoming talks (8)
On-demand talks (400)
Subscribers (95073)
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs