Turning Your Security Strategy Inside Out—Managing Insider Threat

Posted on in Presentations

We are accustomed to building security strategies that defined against external attackers. But you need to think differently when your attacker is inside the organization. Advanced attackers will masquerade as an insider, making it much more difficult to detect them. Hear the inside scoop from two top CISOs on how to use an insider threat model, as well as five steps to build a successful program.

Learning Objectives:
1: Understand the insider threat.
2: Learn how to create a threat risk model using kill chain analysis.
3: Develop an effective insider threat strategy.

James Christiansen


VP CSO, Cloud Security Transformation, Netskope

Gary Harbison


Chief Information Security Officer, Monsanto

Business Perspectives

fraud incident response insider threats threat management data security



Share With Your Community