The Insider Threat: Detecting Risky Behavior
Insider threats are fast becoming one of the greatest concerns to organizations. Whether it be a malicious insider wanting to cause harm, or unintentional insider making an error or being unknowingly coerced by an outsider, mitigating insider threats must be a priority for organizations of all shape and size.
This session will review the difference between an intrusion and a breach, and how to detect and respond appropriately. By diving into real-life scenarios involving insider threats, this session will offer a better understanding of how to approach tools, such as user behavior analytics, within a context that is relevant to differing organizations - not a one-size-fits-all approach. Finally, attendees will take away best practices for insider-threat defense, including strategies and techniques that can be used to assess an organization's current ability to detect and respond to insider threats.
Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.