Webinar • Ciberseguridad: (ISC)² EMEA Channel

Five Steps to Building an Effective Insider Threat ProgramAgéndalo en tu calendario habitual ¡en tu horario!

Jueves, 29 de noviembre de 2018, de 08.00 a 09.00 hs Horario de Virginia (US)
Webinar en inglés

The greatest cybersecurity threat an organisation faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders - the contractors, third party vendors and privileged users who already have full access to your company's systems and sensitive data. According to Ponemon Institute’s report 2018 Cost of Insider Threats, the average cost of an insider threat is $8.76 million annually. Addressing this type of threat requires a different approach to addressing external threats; whether unintentional or malicious, organizations with sensitive customer data need to quickly identify and eliminate insider threat. Attend this webinar to learn the top five steps for building and maintaining an effective insider threat program, with best practices and real-life examples, that you can use. You will learn: - The types of insiders behind these threats 1.How to determine if your organisation is doing enough to address the threats 2.Five key elements to building an effective insider threat strategy 3.How to move beyond IT and think of an insider threat management strategy as a combination of people, processes and technology – in that order.

¿Le gustaría hacer webinars o eventos online con nosotros?
Sponsors
No hay sponsors para este webinar.


Cerrar