Current or former staff, contractor, supplier, or trusted business partner, who has or had authorised access to the organisation’s assets can cause unintentional or intentional security problems that threaten a company’s brand and reputation.
Introduction to build an insider threat program
Introduction to build an insider threat programs 1H Free Webinar
Insiders threats are categorised into accidental, negligent, malicious, and financial-seeking. The main differentiator is whether they are unintentional or intentional. This definition covers seemingly endless scenarios.
How do you create an insider threat program that covers such a wide array of actions?
You'll learn:
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
When it comes to data breaches, it is often the big fines that grab the headlines. As the accepted global benchmark for the effective management of information assets, ISO 27001 enables organisations to avoid the potentially devastating financial losses caused by data breaches.
Organisers of the Webinar
Speaker#1
Chris Denbigh-White,
Security Analyst
Chris Denbigh-White, MBCS GCIH GPEN GNFA CISSP, is a former police and intelligence officer. He has worked in system design and defense for both the public and private sectors. He contributes to the advisory board of the SANS Institute and assists in certification question writing for the ISC2 CISSP exam. Chris currently works with Jazz Analytical Services as a Security Analyst helping clients protect what really matters.
Wed, March 4th, 2020
Wed, March 4th, 2020
10:00 AM – 11:00 AM AEST
CommuniCloud ©copyright 2019. All rights reserved.
Speaker #2
Neena George,
Product Manager
Neena George is a cybersecurity industry professional who is well versed in assessing and building products to meet the ever-evolving threat and technology landscape. Experienced with both network and endpoint security products, she currently enjoys her role as a Systems Engineer and Product Manager at Jazz Networks, where she gets to be at the front line of understanding customer cybersecurity challenges and helping to solve them. Neena holds an M.S in Electrical Engineering from the University of Cincinnati, OH.
Why you need an insider threat program.
What resources you need to build an insider threat program.
Who needs to be a part of your cross-functional team.
How you build an insider threat program from scratch.
Learn how can you detect and mitigate insider threats in your organisation. Limited slots are available.
RSVP here to book your spot.
10:00 AM – 11:00 AM AEST