Forging an Effective Insider Threat Management Program

Logo
Presented by

Sai Chavali, Senior Prod Mktrg Mgr, ObserveIT; Nick Cavalancia, Fndr & Chief Techvangelist; Michael Weisberg

About this talk

Playing defense against the myriad of outside threats that an organization needs to worry about can take all the attention of a cybersecurity team. But it’s critical that they don’t lose sight of the threat that insiders – employees, contractors, partners and business associates can bring to bear. Often time, these parties need legitimate access to systems within the enterprise, but that access can carry significant risk. Taking a proactive approach to detecting risky user behaviour, protecting against data exfiltration and accelerating the investigation time of insider-led data breaches is critical. The development of an Insider threat management program to manage such functions can help an organization get visibility into the problem and streamline these efforts. But where does an organization start when building such a program? What underpinnings need to be in place in order to have success with a program? Is the risk worth the investment? Join Proofpoint and (ISC)2 on April 2,2020 at 1:00PM Eastern for a discussion on how to build an effective insider threat program.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (188)
Subscribers (136686)
ISC2 hosts regular panel discussions on hot button infosecurity topics featuring thought leaders and visionaries from the industry who answer questions from the audience.