Human Behavior: The Heart of an Insider Threat Program

Presented by

Michael Crouse, Director of Insider Risk Programs, Forcepoint

About this talk

What does “Insider Threat” mean to you? For some it means user activity monitoring; some insider risk or data loss protection; for others: risk compliance, and for the adventurous, continuous evaluation and verification. No matter what you name your insider threat program, or what your mission is, all insider threat programs center around human behavior and visibility. In fact, the cybersecurity industry overall is recognizing the need to center around human behavior. Nothing identifies this new understanding better than RSA’s theme: “Human Element”. Human behavior is complex and voluminous, a successful program requires automated and adaptive risk management to rapidly respond to constantly changing threats independent of the individual mission. A successful program must also take a holistic approach, rather than point solutions, to address the mobile workforce, and organizations shift to cloud storage. In this session Mike addresses these unifying elements of a successful program.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (66)
Subscribers (2254)
Forcepoint brings more than twenty years of expertise supporting the unique and complex missions and objectives undertaken by the people who protect national security. Intelligence communities, defense departments, international governments and civilian agencies require rapid, accurate, and secure ways to support their data-driven missions. Forcepoint’s human-centric cybersecurity portfolio brings together a broad set of capabilities that protect sensitive networks and data wherever they are accessed and reside. The system was purposely designed: each element is best in class and can stand alone or integrate within your existing environment to help solve critical security issues and protect employees, data, and IP. Forcepoint enables better decision-making and more efficient security through proactive and context-based technologies and data-centric, integrated solutions. We offer solutions to help solve cross domain security, cloud-based user and application protection, next generation network protection, data security, and systems visibility.