Geo Focus: The United Kingdom , Geo-Specific , ID Fraud

The Insider Threat: Detecting Risky Behavior

The Insider Threat: Detecting Risky Behavior

Insider threats are fast becoming one of the greatest concerns to organizations. Whether it be a malicious insider wanting to cause harm, or unintentional insider making an error or being unknowingly coerced by an outsider, mitigating insider threats must be a priority for organizations of all shape and size.

See Also: Data Security: Controlling Classified Information in the UK Public Sector

This session will review the difference between an intrusion and a breach, and how to detect and respond appropriately. By diving into real-life scenarios involving insider threats, this session will offer a better understanding of how to approach tools, such as user behavior analytics, within a context that is relevant to differing organizations - not a one-size-fits-all approach. Finally, attendees will take away best practices for insider-threat defense, including strategies and techniques that can be used to assess an organization's current ability to detect and respond to insider threats.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.