The greatest cyber security threat an organization faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders – the contractors, vendors, privileged users and business users – who already have full access to your company’s systems and sensitive data. Addressing this type of threat requires a much different approach, but whether unintentional or malicious, you need to quickly identify and eliminate insider threat. Attend this session to learn best practices for building and maintaining an effective insider threat program.
You will learn:
- Why insider threats are prevalent, despite many organisations implementing a layered defence approach
- How to stop insider threats in their tracks, through comprehensive visibility, real-time intelligence and policy enforcement
- How to help organisations achieve data privacy and protection compliance in line with GDPR regulations
- Why you need to focus on people, processes and technology, in that order
Join ObserveIT and (ISC)² on Sep 5, 2018 (Wed) at 15:00 (Singapore time) to learn how to build an insider threat program.
Presenter: Simon Sharp, VP International, ObserveIT;
Jonathan Boyko, Senior Technical Manager, ObserveIT
Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²