Training

Geo-Specific , Governance , Insider Threat

Insider Threat Detection: Lessons from the Trenches Based on Real Insider Cases

Insider Threat Detection: Lessons from the Trenches Based on Real Insider Cases

This session shares the empirical findings of the CERT Insider Threat Center's more than 15 years of research into both malicious and unintentional insider threats. The findings demonstrate how pervasive the insider threat is in all sectors, both private and public. The session also outlines what types of threats are most likely to occur (intellectual property theft, fraud, IT sabotage, industrial espionage, etc.) and which trusted insiders are most likely to be engaged in these attacks. It explores mitigation strategies and offers references to numerous free resources that can aid organizations in the detection, prevention and response to insider threat attacks.

See Also: The Application Security Team's Framework For Upgrading Legacy Applications

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.