Building a Blueprint for an Insider Threat Program

While infosecurity teams are playing defense against external threats, they cannot lose sight of the threat that insiders at their organization pose. Employees, contractors and business associates can all have accounts which provide them legitimate access to systems within the enterprise, but that access can carry significant risk.

Detecting, monitoring and preventing such unauthorized access and exflitration is critical. Building an Insider threat program to manage such functions can help an organization get visibility into the problem and streamline these efforts. But where does an organization start when building such a program? What underpinnings need to be in place in order to have success with a program? Get an inside scoop on what it is really like to build and run these types of programs; what are insiders really doing and what are they stealing. Listen to this on-demand webinar for a discussion on how to construct an effective insider threat program.

    Please complete the form below to access this research:

    Business E-mail Address

    First Name

    Last Name

    Company

    Company Size

    Job Title

    Job Function

    Industry

    Address

    City

    State/Province

    Zip

    Country

    Business Phone

    By clicking on the “submit” button above, I agree that I have carefully read the Legal Notices, and the Privacy Policy, and I agree to be legally bound by all such terms.

    Save

    Save

    Save

    Save

    Save