InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

The Secrets to an Effective Insider Threat Program

Presented by

Nathaniel Ford, Moderator, (ISC)² EMEA, Mayank Choudhary, Vice President, Observe IT

About this talk

With three million records stolen every day, insider threats are quickly becoming the greatest cybersecurity threat organisations face today. Unfortunately, the most trusted people - contractors, vendors, privileged users and business users - often create the most risk. Whether insider threats are unintentional or malicious, the secret to quickly identifying and eliminating them starts with a people-centric approach. Attend this webinar to learn best practices for building and maintaining an effective insider threat program. You will learn: - Why insider threats are prevalent, despite many organizations implementing a layered defense approach - How to stop insider threats in their tracks, through comprehensive visibility, real time intelligence and policy enforcement - Why you need to focus on people, process and technology, in that order
ISC2 Security Briefings - EMEA

ISC2 Security Briefings - EMEA

118178 subscribers437 talks
ISC2 Security Briefings - EMEA
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs
Related topics