What an Insider Threat Strategy Should Consist of For Effective Detection

Logo
Presented by

Moderator: Dan Raywood - Speakers: Lisa Forte, Todd Thorsen, Heath Renfrow

About this talk

The issue of insider threat has been a testing one for cybersecurity – we know it goes on, but it is rarely reported, companies struggle to detect and prevent it, and the issues of monitoring employees come with the taboo of privacy and surveillance. In this webinar, we will look at both the issue of how the insider threat has risen and been dealt with, and also how you can create a strategy to better detect malicious insiders, and how to deal with the person and the issue. Key takeaways: How to create an insider threat strategy and what it can look like Issues on using monitoring technology in the workplace and on remote users How to classify data with a remote workforce
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (599)
Subscribers (44309)
Dedicated to serving the information security community, in person, in print and online.