Four Best Practices to Combat Insider Threats in Your Supply Chain

Logo
Presented by

Rob Bolton, Senior Director, Information Protection, Proofpoint EMEA

About this talk

Collaboration has been key to many organisations’ success throughout the transition to remote working. Broadening the supply chain to collaborate with remote employees, new applications, increased cloud-based storage and new sanctioned endpoints has created new opportunities for insider-led breaches. Safeguarding your organisation's IP and user data relies upon a people-centric approach to managing insider risk. Collaboration has been key to many organisations’ success throughout the transition to remote working. Broadening the supply chain to collaborate with remote employees, new applications, increased cloud-based storage and new sanctioned endpoints has created new opportunities for insider-led breaches. Safeguarding your organisations’ IP and user data relies upon a people-centric approach to managing insider risk. Join us as we discuss how the technology sector and others in agile, collaborative industries can manage insider threats. In this session, you will learn how to: - Allow for open collaboration by using data to identify user risk - Protect your competitive advantage with real-time IP data tracking - Safeguard user data when working with third parties to remain compliant - Prepare your incident response plan to avoid unnecessary data loss
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (755)
Subscribers (79675)
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 85 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.