Define High-Risk Users in Your Insider Threat Management Program

Logo
Presented by

Sai Chavali, Sr. Product Marketing Manager, Proofpoint

About this talk

Not all users are alike. Some will pose a higher risk to your organization than others. Managing insider threats starts with deciding which of your users pose the biggest risk when it comes to a potential incident or breach. The term “insider threat” is commonly associated with users who show malicious intent. But negligent or compromised users actually make up three quarters of insider breaches, according to Ponemon Institute. Join our ITM expert to learn 4 best practices around preventing common data loss and insider risk you can put into use today to better protect your organization. In this session you will learn about: - Visibility into users moving between web, endpoint and USB - Preventing data loss to old-school but popular channels: USB devices - Who else is doing something out of policy (e.g. using out-of-policy applications) - Sharing evidence that is easily understood by my colleagues
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (758)
Subscribers (79701)
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 85 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.