How to Build a Detection & Response Strategy for Insider Threats

Logo
Presented by

Sai Chavali, Sr. Product Marketing Manager & Jeremy Whitkop, Sr. Director of Technology Services at Proofpoint

About this talk

It’s common for organizations to spend time investigating external cyber threats, including understanding the motivations, intent and capabilities of attackers. But this level of effort is rarely employed when it comes to internal threats. Insider threats are a significant and underinvested problem, and it is crucial for organizations to adopt a people-centric approach to cybersecurity to better protect their data. Join us for a 30-minute webinar on Insider Threat Management (ITM) programs. Our Proofpoint experts will deep dive into customer case studies and explore how companies built successful ITM programs with governance and incident response processes, collaboration across teams, and strong detection and prevention technology. You will learn: - The primary types of insider threats: negligent, malicious or compromised users - Why a people-centric, comprehensive and cloud-native technology approach is crucial - Customers strategies for building successful people-centric ITM programs - Where managed services can help you build the right processes and augment your security teams

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (571)
Subscribers (70493)
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.