Keeping Insider Threats at Bay: Key Steps to Building a Successful Audit Program presented at CISOphiladelphia 2016

by Anahi Santiago, Doug Copley, Michael Ansel,

Summary : Malicious insiders have the upper hand in many organizations, and IT security staffs can be overwhelmed by the noise of false alerts caused by multiple tools that don't talk to each other. These well-intentioned tools end up adding more complexity, less security and allowing insider threats to go undetected. Learn how best to identify and stop insider threats before a breach occurs and confidential data can be stolen. We'll share valuable insights into today’s insider threat landscape, fortifying a robust insider threat defense, and the ways in which behavioral analytics can help keep insider threats at bay — from the inside out.