Data Breach , Data Breach Prevention and Response Summit , Events

Insider Threat Detection: How to Develop a Successful Program
Insider Threat Detection: How to Develop a Successful Program

What are the biggest threats to your organization's data? Recent media attention to high-profile cyberattacks would lead an organization to think external threats are its only concern. Unfortunately, this misconception allows another significant threat to your organization's critical assets to stay completely under the radar - the threat of malicious and non-malicious insiders.

See Also: Addressing the Identity Risk Factor in the Age of 'Need It Now'

With so much of an organization's valuable information digitized today, it may be possible that an insider can steal your information or expose it unintentionally without you knowing it.

In this session you will learn:

  • Some of the startling results of meticulous analysis of hundreds of real-life insider attacks from the CERT Insider Threat Center, part of the Software Engineering Institute at Carnegie Mellon University;
  • Some potential technical and behavioral insider threat risk indicators;
  • Which new technologies enable the detection of anomalous behavior patterns often before an insider incident occurs;
  • The five steps companies need to take in order to develop an effective Insider Threat Detection Program.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

Slide Previews

Around the Network