Five Steps to Building an Effective Insider Threat Program

Logo
Presented by

Brandon Dunlap, Moderator, (ISC)², Simon Sharp, VP International, ObserveIT

About this talk

The greatest cybersecurity threat an organisation faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders - the contractors, third party vendors and privileged users who already have full access to your company's systems and sensitive data. According to Ponemon Institute’s report 2018 Cost of Insider Threats, the average cost of an insider threat is $8.76 million annually. Addressing this type of threat requires a different approach to addressing external threats; whether unintentional or malicious, organisations with sensitive customer data need to quickly identify and eliminate insider threat. Attend this webinar to learn the top five steps for building and maintaining an effective insider threat program, with best practices and real-life examples, that you can use. You will learn: - The types of insiders behind these threats 1.How to determine if your organisation is doing enough to address the threats 2.Five key elements to building an effective insider threat strategy 3.How to move beyond IT and think of an insider threat management strategy as a combination of people, processes and technology – in that order.
Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (392)
Subscribers (93638)
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs