Rob Bolton, Insider Threat Management Director, Proofpoint EMEA
Not all users are alike. Some will pose a higher risk to your organisation than others. Managing insider threats starts with deciding which of your users pose the biggest risk when it comes to a potential incident or breach. The term “insider threat” is commonly associated with users who show malicious intent. But negligent or compromised users actually make up three-quarters of insider breaches, according to Ponemon Institute.
Join our panel of experts to learn how to identify high risk users and deploy a risk-based user and data activity monitoring strategy to protect your organisation.
In this 30-min panel, we will unveil:
- How to identify high risk users, including privileged and compromised users
- Tips to gain visibility into these high risk users, with context into user activity and data movement
- Key strategies to protect your organisation from the loss of critical data and IP