Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.

According to the US Department of Homeland Security 46 percent of the most expensive cybercrimes were a result of an insider threat and almost 34 percent of insider threat cases were targeted towards collecting personally identifiable information (PII).

Having controls in place to prevent, detect, and mitigate insider threat surge and accidental data leaks is a necessity for any organization that intends to protect its business-critical data.

Yet, Gartner states that only less than 20 percent of the organizations have an insider threat program today. While it is expected to grow to 60 percent by 2023, organizations must prepare for a functional insider threat program as a core part of their holistic cybersecurity strategy.

Building a proper insider threat program requires multiple technologies including endpoint detection and response (EDR), data loss prevention (DLP),and in-depth analysis of user behavior (UBA).

 

Join our panel of experts in our upcoming webinar to learn about:

– Identifying the indicators that reveal malicious insiders and understanding common use cases that happen every second at work

– Insider threat detection capabilities with User Behavior Analytics (UBA) insights added to SIEM

– Best practices for building and maintaining an effective insider threat program through comprehensive visibility, real time intelligence and policy enforcement

Jay Reddy

Senior technical evangelist, ManageEngline

Jay Reddy has been associated with ManageEngine for over 5 years. As a technical evangelist, he helps IT leaders and global enterprises to outmaneuver complex cybersecurity challenges. He is a sought after speaker on the latest IT trends in international conferences and seminars. He has authored numerous e-books and conducted research studies that help business leaders with insight and advice on leveraging the latest technology for better IAM and cybersecurity.

Robert Papp

Head of compliance, GE

Robert Papp is the Chief Compliance Officer for GE covering the Middle East, Africa, Turkey and Pakistan. Before moving to the Compliance function early 2017, Robert was the Sourcing Executive for GE Power Services in the Middle East and Africa. He moved to Dammam, Saudi Arabia in 2008 to lead the region’s turbine repair network and design and build GE’s largest turbine service centre worldwide. Before coming to the Middle East, he was General Manager of various field service and repair facilities in Europe and North America and has held various Lean Six Sigma, Service Director and Quality roles. Prior to joining GE in 2000, he held various Plant Manager, Quality and Industrial Development roles for small and medium-sized companies in North America and Europe.

Suresh Nair

Chief Information Security Officer, General Electric

Suresh Nair is the Regional CISO for MENAT & SSA (META) and is responsible for defining Cyber Security strategy for META region. Suresh provides strategic leadership to IT Security related projects & initiatives and supports all GE businesses. He is certified in CPP, C|CISO, CISSP, CISA, CISM, CRISC, Security+ to name a few and has a double Masters to his credit and has over 16+ of core Information Security & Governance experience in the overall 19+ years career.

 

Register today

Title: Building an Insider Threat Program for your Organization

Date: Thursday 8th October

Time: 2pm British Summer Time (+ on-demand)

Duration: 1 hour