Lessons Learned from Operational Insider Threat Programs

Logo
Presented by

Panel: Craig Cooper, Chief Operating Officer & Michael Williams, Director of Technology & Insider Risk, Edward Jones

About this talk

Join Gurucul’s customer for a discussion on lessons learned operationalizing Insider Threat Programs. With proven strategies and tactics, organizations can get to the point where they are able to remediate insider threats in real-time or at least before data is exfiltrated. Insider threats are a serious concern, and they are on the rise. What's new are the threat vectors that have presented themselves in recent months. Work from home employees, staff reduction, reduced hours, or furloughed insiders; the unfortunate reality is that insider risk is certainly on the rise. The expansion of work from home policies means more employees accessing corporate networks and data over public networks using personal devices. Every organization needs to update its Insider Threat Program or at minimum, implement basic monitoring controls.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (86)
Subscribers (6759)
Gurucul is transforming enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor for threats, Gurucul provides Actionable Risk Intelligence™ to protect against targeted and under-the-radar attacks. Gurucul is able to proactively detect, prevent, and deter advanced insider threats, fraud and external threats to system accounts and devices using self-learning, behavioral anomaly detection algorithms. Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world renowned-experts in government intelligence and cyber security. The company was founded by seasoned entrepreneurs with a proven track record of introducing industry changing enterprise security solutions. Our mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.