Tips for deploying an Insider Threat Program

Who Watches the Watchers?

Cover

Protecting the confidentiality of information is a critical security task. While it is relatively easy to defend against those insiders who should not be accessing certain IP, it is often the employees that create the IP who are most likely to steal it.

In this webcast, Forcepoint Chief Scientist, Dr. Richard Ford, looks at analytic techniques that are effective at protecting information from those who already have legitimate access to it.

Tune into the webcast to learn about:

  • The need for a human-centric approach to tackle the malicious insider
  • Behavioral red flags to look out for
  • Tips for deploying an Insider Threat Program
  • And more
Vendor:
Forcepoint
Premiered:
11 Jun 2019
Language:
English
Already a Bitpipe member? Login here

Download this Video!