Resources | SecureWorld

5 Must-Haves in Developing an Insider Threat Program that Protects Sensitive Data

Written by SecureWorld News Team | 7 PM Z

Gone are the days when everything that happened at work occurred between "these four walls." The world was challenged and rose to the occasion; people are working from literally everywhere. Unfortunately, greed didn't take a vacation. We've heard stories of malicious employees allowing access to corporate networks for a payout, negligent employees posting data in a public cloud container, accidental exposure through a targeted phishing scheme, and compromised attackers exfiltrating corporate data.

It was a little easier to spot abnormal behavior or a disgruntled employee in the old days. With people working from all over, it makes identifying and monitoring the sensitive data individuals have access to much more complicated.

Our panel will identify the different types of insider threats they see in the wild and offer their advice on the five "must-haves" to help deter this growing threat to corporate data security and privacy.

Attendees are eligible to receive 1 CPE credit.