InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Tackling Insider Threats in Financial Services

Presented by

John Checco, Resident CISO, Financial Services and Stephanie Torto, Senior Product Marketing Manager

About this talk

Insider threats are the top concern of CISOs globally and across many industries. For Financial Services organizations, insider threats are particularly challenging due to large volumes of highly sensitive and regulated data, acceleration of shadow IT, and a hybrid workforce. These dynamics have increased the risks of data loss and financial and brand damage from careless, malicious, and compromised users. As a result, Financial Services has the highest annualized cost of insider threats at $21.3 million, more than any other industry.1 Join us for a discussion with John Checco, Proofpoint’s Resident CISO for Financial Services, and Stephanie Torto, Senior Product Marketing Manager at Proofpoint, to understand what makes Financial Services organizations prone to insider threats and what strategies organizations can take to mitigate risk. During the webinar, you will learn: • The three types of insider threats and why they are trending up in Financial Services • The importance of context to understand people risk • Real-world examples of insider threat use cases and their implications • How to take a proactive, context-driven approach to managing insider threats
Information Systems Security Association

Information Systems Security Association

40767 subscribers390 talks
Developing and Connecting Cybersecurity Leaders Globally
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.
Related topics