Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

The Inside Line on Information Protection: From Malicious to Careless: How to Investigate Insider Threats

The Inside Line on Information Protection: From Malicious to Careless: How to Investigate Insider Threats

FromProtecting People


The Inside Line on Information Protection: From Malicious to Careless: How to Investigate Insider Threats

FromProtecting People

ratings:
Length:
29 minutes
Released:
Oct 5, 2021
Format:
Podcast episode

Description

How is an insider threat incident response like a murder investigation?

You start with motive, then leverage investigative tools and knowledge of people to unearth a trail of mistakes. (Yes, it’s actually quite exciting!)

In this episode, series host Sai Chavali speaks with fellow Protecting People host Brian Reed, Cybersecurity Evangelist at Proofpoint, about insider threat cases and what makes a successful incident response.

Join us as we discuss:
The three buckets of insider threats
Specific insider threat cases every investigator should study
Asking “who, what, why, and when” to protect against insider threats
How incident response can be like a murder investigation



Check out these resources we mentioned:
Report mentioned at [5:47]


2020 Cost of Insider Threats: Global Report 
Proofpoint blog post mentioned at [8:19]


The Top 10 Biggest and Boldest Insider Threat Incidents, 2020-2021 

For more episodes like this one, subscribe to us on Apple Podcasts, Spotify, and the Proofpoint website, or just search for Protecting People in your favorite podcast player.
Released:
Oct 5, 2021
Format:
Podcast episode

Titles in the series (100)

Today’s cyber attacks target people, not technology. Protecting People is a podcast focused on the human side of cybersecurity. Each episode, you’ll learn how today’s threats really work, who’s being targeted by them, and what you can do to safeguard your people, data and systems.Get real-world insight and learn about the latest trends in social engineering, malware, threat protection, cloud security and more. Protecting People is cybersecurity for the rest of us.