Security Congress Abstract
Your organization’s sensitive, critical, protected and otherwise valuable data is accessible by the most difficult—and potentially harmful—threat to identify: the insider. These users are granted access as part of their role to data that can provide personal value outside the organizations if used inappropriately. And, because they leverage granted privilege to access IP, PII and other valuable data, how can you tell if it’s for the organization's benefit, or their own?
During this presentation, we'll discuss:
• How to assess insider risk before it’s a problem
• What behaviors and intelligence sources should be watched for potential and active threats
• How to develop a mature insider threat program