Current or former staff, contractor, supplier, or trusted business partner, who has or had authorised access to the organisation’s assets can cause unintentional or intentional security problems that threaten a company’s brand and reputation.

Introduction to build an insider threat program

REQUEST AN INVITATION

Introduction to build an insider threat programs 1H Free Webinar

Insiders threats are categorised into accidental, negligent, malicious, and financial-seeking. The main differentiator is whether they are unintentional or intentional. This definition covers seemingly endless scenarios.

How do you create an insider threat program that covers such a wide array of actions?


You'll learn:

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Stay one step ahead
ISO 27001 skills enable you to demonstrate to customers and other stakeholders you have the controls and procedures in place to protect their data by preventing data breaches. 


Protect your data & reputation
 

When it comes to data breaches, it is often the big fines that grab the headlines. As the accepted global benchmark for the effective management of information assets, ISO 27001 enables organisations to avoid the potentially devastating financial losses caused by data breaches.


Retain customers & win new businesses
Information security and data protection (GDPR) is making its way into the public. Aligning your organisation with the priorities and requirements of your customers will make you a far more attractive prospect.
Fifth Benefit
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. 
Sixth Benefit
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. 

Organisers of the Webinar

Speaker#1

Chris Denbigh-White, 

Security Analyst

Chris Denbigh-White, MBCS GCIH GPEN GNFA CISSP, is a former police and intelligence officer. He has worked in system design and defense for both the public and private sectors. He contributes to the advisory board of the SANS Institute and assists in certification question writing for the ISC2 CISSP exam. Chris currently works with Jazz Analytical Services as a Security Analyst helping clients protect what really matters.

About your speakers 
About the Webinar

Wed, March 4th, 2020

See incredible results by making the switch to us

Why an insider threat program is essential for your business?

Date & Time

Wed, March 4th, 2020

10:00 AM – 11:00 AM AEST

Questions? Call +61 2 8004 1124

CommuniCloud ©copyright 2019. All rights reserved.

 1 Hour Free Webinar

Speaker #2

Neena George, 

Product Manager

Neena George is a cybersecurity industry professional who is well versed in assessing and building products to meet the ever-evolving threat and technology landscape. Experienced with both network and endpoint security products, she currently enjoys her role as a Systems Engineer and Product Manager at Jazz Networks, where she gets to be at the front line of understanding customer cybersecurity challenges and helping to solve them. Neena holds an M.S in Electrical Engineering from the University of Cincinnati, OH.

Why you need an insider threat program.

What resources you need to build an insider threat program.  

Who needs to be a part of your cross-functional team.

How you build an insider threat program from scratch.

Learn how can you detect and mitigate insider threats in your organisation. Limited slots are available. 

RSVP here to book your spot.


10:00 AM – 11:00 AM AEST

1 Hour Free Cyber Security Webinar

Insider threat program

Insider threat program

REQUEST AN INVITATION

Many of the most damaging security threats come from ‘trusted’ employees – who may be malicious or negligent, or indeed both. By learning how to build an insider threat program you'll gain the knowledge on how to protect your organisation from the internal threats such as unintentional or malicious insiders, data britches, theft of intellectual property, corporate sabotage and fraud. 


1 H Free Cyber Security Webinar

REQUEST AN INVITATION

1 H Free Cyber Security Webinar

Insider threat program