vCISO, Cybersecurity Management Consultant Virtual CSO, LLC, United States
Get practical advice that will help you establish insider risk monitoring and response capabilities. Topics include monitoring process diagrams; continuous data exfiltration monitoring; monitoring initiation criteria; evidence-based inference; and technical requirements. Learn from examples how to overcome reluctance to insider risk monitoring due to corporate culture. You’ll take back resources you can leverage at your organization, including more than 20 insider risk management activities.
Learning Objectives:
Identify and mitigate insider risk.
Recognize behavioral indicators and criteria to initiate enhanced monitoring.
Employ measures to prevent insider threat from impacting business operations.