Building a Successful Audit Program to Keep Insider Threats at Bay presented at CISOphoenix 2015

by Jason Lish, Jeffrey Coe, Kelly Harward,

Summary : Insider threats encompass more than just the obvious data thief. According to the CERT Insider Threat Center, in 2014, 53 percent of organizations experienced some type of insider incident. While your IT system can be a witness, victim or enabler, insider threat is more than a technology problem — policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible yet very real vulnerability. Join your peers for this open discussion on managing and mitigating insider threats within your organization.