Navigating and Managing Insider Risk

Logo
Presented by

Michael Crouse, Forcepoint

About this talk

Confusion reigns between Insider Threat, Insider Risk, Data Loss Prevention, Zero Trust, and more. During this session, we will discuss the challenges and potential outcomes involved with bringing together different activities to align as one program in a more robust and agile insider risk management capability. With an incremental implementation approach, company programs can responsibly expand beyond traditional Insider Threat Use Cases (aka Data Exfiltration Only) to real-time alerts about abnormal data and system access (internal and external), suspicious financial activity, intent to harm, and public record information. Identifying indicators of risk at the individual level at their earliest point of detection is a foundational step in developing a proactive approach for improving an organization's security posture. We will explore how continually monitoring user behavior will significantly reduce the level of human effort spent on such activities, thereby freeing up your analysts and investigators to focus on more critical security issues.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (271)
Subscribers (35096)
To enable users to work anywhere, we must put data protection at the center of cloud and network security strategies. In this channel, we explore the latest technologies, security trends and frameworks like Zero Trust and SASE to help you not only determine where you are, but also what you still need to do to protect your business. Get the materials and building blocks you need to implement a data-first SASE architecture. See for yourself. https://www.forcepoint.com/sase