32 min listen
The Inside Line on Information Protection: You Desperately Need an Insider Threat Program
The Inside Line on Information Protection: You Desperately Need an Insider Threat Program
ratings:
Length:
45 minutes
Released:
Sep 15, 2021
Format:
Podcast episode
Description
Guess how many organizations found they had an insider threat incident at least once — 69%.
Of the remaining 31%, it’s most likely the case that they simply don’t have the capability to identify insider threats, not that they were incident-free.
In this episode, series host Sai Chavali speaks with Proofpoint’s Deborah Watson, Resident CISO, and Jeremy Wittkop, Senior Director, Technology Services, PCMS, about jumpstarting a successful insider threat program.
Join us as we discuss:
What insider threats are and where they can come from
How to monitor for the unknown
Why insider threat training needs to be frequent and reinforced
How to build and measure your insider threat program
For more episodes like this one, subscribe to us on Apple Podcasts, Spotify, and the Proofpoint website, or just search for Protecting People in your favorite podcast player.
Of the remaining 31%, it’s most likely the case that they simply don’t have the capability to identify insider threats, not that they were incident-free.
In this episode, series host Sai Chavali speaks with Proofpoint’s Deborah Watson, Resident CISO, and Jeremy Wittkop, Senior Director, Technology Services, PCMS, about jumpstarting a successful insider threat program.
Join us as we discuss:
What insider threats are and where they can come from
How to monitor for the unknown
Why insider threat training needs to be frequent and reinforced
How to build and measure your insider threat program
For more episodes like this one, subscribe to us on Apple Podcasts, Spotify, and the Proofpoint website, or just search for Protecting People in your favorite podcast player.
Released:
Sep 15, 2021
Format:
Podcast episode
Titles in the series (100)
Exploring Vulnerability: Why Phishing Works: Just 61% of survey respondents knew what the definition of phishing was — and that was from a multiple-choice list. This response is a huge indication of the language gap between InfoSec and users, which speaks to the urgent need for security... by Protecting People