15 min listen
Insider Threat Awareness: How to Protect your Organization from Risky Users
Insider Threat Awareness: How to Protect your Organization from Risky Users
ratings:
Length:
40 minutes
Released:
Sep 6, 2022
Format:
Podcast episode
Description
September 2022 is the fourth annual National Insider Threat Awareness Month. This month is dedicated to emphasizing the importance of safeguarding our nation and organization by detecting, deterring, and mitigating insider threats.
In honor of National Insider Threat Awareness Month, we invited Jonathan Care, Cybersecurity Expert and Former Gartner Analyst, to join us to help bring awareness to this crucial topic and dive deeper into insider risks and threats within organizations.
Join us as we discuss:
The difference between insider threat and insider risk in organizations
Some of the common behavior patterns that indicate there might be insider threat or risk going on with employees
The value of implementing an Insider Threat program within an organization
Resources:
https://cybersecurityforward.it.wisc.edu/wp-content/uploads/sites/1326/2020/02/Building-Incident-Response-Scenarios-for-Insider-Threats-Brian-Reed.pdf
www.proofpoint.com/us/resources/threat-reports/cost-of-insider-threats
www.proofpoint.com/us/reduce-insider-risk/insider-threat-management-hub
For more episodes like this one, subscribe to Protecting People on Apple Podcasts, Spotify, the Proofpoint website, or anywhere you get podcasts.
In honor of National Insider Threat Awareness Month, we invited Jonathan Care, Cybersecurity Expert and Former Gartner Analyst, to join us to help bring awareness to this crucial topic and dive deeper into insider risks and threats within organizations.
Join us as we discuss:
The difference between insider threat and insider risk in organizations
Some of the common behavior patterns that indicate there might be insider threat or risk going on with employees
The value of implementing an Insider Threat program within an organization
Resources:
https://cybersecurityforward.it.wisc.edu/wp-content/uploads/sites/1326/2020/02/Building-Incident-Response-Scenarios-for-Insider-Threats-Brian-Reed.pdf
www.proofpoint.com/us/resources/threat-reports/cost-of-insider-threats
www.proofpoint.com/us/reduce-insider-risk/insider-threat-management-hub
For more episodes like this one, subscribe to Protecting People on Apple Podcasts, Spotify, the Proofpoint website, or anywhere you get podcasts.
Released:
Sep 6, 2022
Format:
Podcast episode
Titles in the series (100)
So You Want to Be a Cyber Criminal by Protecting People