5 Steps to Building A People-Centric Insider Threat Program - APAC

Presented by

Shlomi Shaki, Account Executive, APJ: Sai Chavali, Sr Product Mgr, UK & Erich Anderson, Principle Consultant, US

About this talk

Most organizations understand the challenge of external cyber-attacks. But many of today’s biggest threats come from within. According to a recent study from Ponemon Institute, insider threats of all types have risen 45% in just two years, racking up a 31% increase in average costs over the same time period. Whether it’s careless users, disgruntled employees or compromised accounts - the cost of insider threats is on the rise. Addressing this type of threat requires a completely different approach to cybersecurity. After all, traditional security solutions are not designed to stop legitimate users accessing systems within the enterprise – or manage the significant risks. To address this challenge head-on, organizations need to develop an insider threat program, which can provide visibility into insider-led data breaches and streamline response and investigation, while balancing the protection of corporate assets with employee privacy. Join this webinar to learn the top five steps for building and maintaining a people-centric insider threat program, with best practices and real-life examples that you can use, including: - What kinds of Insider Threats cost organizations the most? - How to determine if your organization is doing enough to address insider threats - Five elements to building an effective insider threat program - Designing an insider threat management strategy as a combination of people, processes and technology – in that order!

Related topics:

More from this channel

Upcoming talks (7)
On-demand talks (724)
Subscribers (76644)
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.