While it is relatively easy to thwart insiders who should not be accessing certain IP, stopping the developers of the IP is more challenging. This practical session will explore a scenario based on details disclosed in the FBI’s affidavit discussing the potential theft of trade secrets from GE. How can human-behavioral analytics aid in protecting IP from those who have legitimate access?
1: Understand overlooked need to protect IP from those who create it or legitimately interact with it.
2: Gain a practical framework for choosing between various monitoring strategies and data sources.
3: Learn how to construct a defensive perimeter to effectively detect precursors to actual data theft.
Interest in learning more about standing up insider threat programs.
Protecting Data & Applied Crypto
security intelligence insider threats fraud data security data loss prevention
Share With Your Community