Playing defense against the myriad of outside threats that an organization needs to worry about can take all the attention of a cybersecurity team. But it’s critical that they don’t lose sight of the threat that insiders – employees, contractors, partners and business associates can bring to bear. Often time, these parties need legitimate access to systems within the enterprise, but that access can carry significant risk. Taking a proactive approach to detecting risky user behaviour, protecting against data exfiltration and accelerating the investigation time of insider-led data breaches is critical. The development of an Insider threat management program to manage such functions can help an organization get visibility into the problem and streamline these efforts. But where does an organization start when building such a program? What underpinnings need to be in place in order to have success with a program? Is the risk worth the investment? Join Proofpoint and (ISC)2 on April 2,2020 at 1:00PM Eastern for a discussion on how to build an effective insider threat program.

Hora

19:00 - 20:00 hs GMT+1

Organizador

(ISC)2 Think Tank
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Mayo / 2020 1150 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 27 de Mayo de 2020
Mar 28 de Mayo de 2020
Mié 29 de Mayo de 2020
Jue 30 de Mayo de 2020
Vie 01 de Mayo de 2020
Sáb 02 de Mayo de 2020
Dom 03 de Mayo de 2020
Lun 04 de Mayo de 2020
Mar 05 de Mayo de 2020
Mié 06 de Mayo de 2020
Jue 07 de Mayo de 2020
Vie 08 de Mayo de 2020
Sáb 09 de Mayo de 2020
Dom 10 de Mayo de 2020
Lun 11 de Mayo de 2020
Mar 12 de Mayo de 2020
Mié 13 de Mayo de 2020