Turning Your Security Strategy Inside Out—Managing Insider Threat

We are accustomed to building security strategies that defined against external attackers. But you need to think differently when your attacker is inside the organization. Advanced attackers will masquerade as an insider, making it much more difficult to detect them. Hear the inside scoop from two top CISOs on how to use an insider threat model, as well as five steps to build a successful program.

Learning Objectives:
1: Understand the insider threat.
2: Learn how to create a threat risk model using kill chain analysis.
3: Develop an effective insider threat strategy.



Gary Harbison Chief Information Security Officer, Monsanto


James Christiansen VP, Global CISO, Teradata

← View more Videos

This document was retrieved from on Sun, 18 Aug 2019 11:23:54 -0400.