Training

ID Fraud

Insider Threat Detection: How to Develop a Successful Program

Insider Threat Detection: How to Develop a Successful Program

What are the biggest threats to your organization's data? Recent media attention to high-profile cyberattacks would lead an organization to think external threats are its only concern. Unfortunately, this misperception allows one of the biggest threats to your organization's data to stay completely under the radar the threat of insiders. With so much of an organization's valuable information digitized today, it has never been easier to steal sensitive data. In this session you will learn:

See Also: OnDemand | Combatting Rogue URL Tricks: How You Can Quickly Identify and Investigate the Latest Phishing Attacks

  • Some of the startling results of meticulous analysis of hundreds of real-life insider attacks from the team at Carnegie Mellon University's Computer Emergency Response Team (CERT)
  • Which new technologies enable the detection of anomalous behavior patterns often before actual fraud even occurs;
  • The five steps companies need to take in order to develop an effective Insider Threat Detection Program.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

Slide Previews

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.