Turning Your Security Strategy Inside Out—Managing Insider Threat


Posted on in Presentations

We are accustomed to building security strategies that defined against external attackers. But you need to think differently when your attacker is inside the organization. Advanced attackers will masquerade as an insider, making it much more difficult to detect them. Hear the inside scoop from two top CISOs on how to use an insider threat model, as well as five steps to build a successful program.

Learning Objectives:
1: Understand the insider threat.
2: Learn how to create a threat risk model using kill chain analysis.
3: Develop an effective insider threat strategy.

Participants
James Christiansen

Participant

VP CSO, Netskope

Gary Harbison

Participant

Senior Vice President, Global Chief Information Security Officer, Johnson & Johnson


Share With Your Community