Start With Your People – How to Best Protect Against Insider Threats presented at CISOdallas 2015

by Joseph D'agostino, Kelly Harward, Alex Nehlebaeff,

Summary : Going beyond simple data theft, controlling insider threats requires more than just managing thumb drives. Insider threats can also manifest as unaware users tricked through social engineering, sabotage by a disgruntled employee, fraud by a dishonest supply chain manager or an angry employee looking to seek redress for perceived wrongs. Join Kelly Harward to learn how the effective use of user activity monitoring solutions can provide optimal return on investment and allow resources to be applied where they can benefit the enterprise the most.