Turning Your Security Strategy Inside Out—Managing Insider Threat


Posted on in Presentations

We are accustomed to building security strategies that defined against external attackers. But you need to think differently when your attacker is inside the organization. Advanced attackers will masquerade as an insider, making it much more difficult to detect them. Hear the inside scoop from two top CISOs on how to use an insider threat model, as well as five steps to build a successful program.

Learning Objectives:
1: Understand the insider threat.
2: Learn how to create a threat risk model using kill chain analysis.
3: Develop an effective insider threat strategy.

Participants
Gary Harbison

Participant

Chief Information Security Officer, Monsanto

James Christiansen

Participant

VP CSO, Cloud Security Transformation, Netskope

Business Perspectives

fraud incident response insider threats threat management data security


Topic

Subtopic


Share With Your Community