Best Practices for Building an Effective Insider Threat Program

Logo
Presented by

Simon Sharp, VP International, ObserveIT

About this talk

The greatest cyber security threat an organization faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders – the contractors, vendors, privileged users and business users – who already have full access to your company’s systems and sensitive data. Addressing this type of threat requires a much different approach, but whether unintentional or malicious, you need to quickly identify and eliminate insider threat. Attend this session to learn best practices for building and maintaining an effective insider threat program. You will learn: - Why insider threats are prevalent, despite many organisations implementing a layered defence approach - How to stop insider threats in their tracks, through comprehensive visibility, real-time intelligence and policy enforcement - How to help organisations achieve data privacy and protection compliance in line with GDPR regulations - Why you need to focus on people, processes and technology, in that order Join ObserveIT and (ISC)² on Sep 5, 2018 (Wed) at 15:00 (Singapore time) to learn how to build an insider threat program. Presenter: Simon Sharp, VP International, ObserveIT; Jonathan Boyko, Senior Technical Manager, ObserveIT Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (459)
Subscribers (71019)
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.