High Risk Users: Who Are They and How Do You Protect Your Organisation?

Logo
Presented by

Rob Bolton, Insider Threat Management Director, Proofpoint EMEA

About this talk

Not all users are alike. Some will pose a higher risk to your organisation than others. Managing insider threats starts with deciding which of your users pose the biggest risk when it comes to a potential incident or breach. The term “insider threat” is commonly associated with users who show malicious intent. But negligent or compromised users actually make up three-quarters of insider breaches, according to Ponemon Institute. Join our panel of experts to learn how to identify high risk users and deploy a risk-based user and data activity monitoring strategy to protect your organisation. In this 30-min panel, we will unveil: - How to identify high risk users, including privileged and compromised users - Tips to gain visibility into these high risk users, with context into user activity and data movement - Key strategies to protect your organisation from the loss of critical data and IP

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (574)
Subscribers (70610)
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.