Download pdf
While it is relatively easy to thwart insiders who should not be accessing certain IP, stopping the developers of the IP is more challenging. This practical session will explore a scenario based on details disclosed in the FBI’s affidavit discussing the potential theft of trade secrets from GE. How can human-behavioral analytics aid in protecting IP from those who have legitimate access?

Learning Objectives:
1: Understand overlooked need to protect IP from those who create it or legitimately interact with it.
2: Gain a practical framework for choosing between various monitoring strategies and data sources.
3: Learn how to construct a defensive perimeter to effectively detect precursors to actual data theft.

Interest in learning more about standing up insider threat programs.