Gain the knowledge you need to develop an efficient insider threat program. Find out how to better detect and identify unusual and unauthorized behavior so you can intervene before your team’s intellectual property has been compromised. Most importantly, you will develop an understanding of how you can implement a Zero Trust architecture designed to withstand any attack – inside or otherwise.
Bolster existing programs and capabilities
Review how to simplify the problem and highlight conspicuous behavior
Discussion of real world events when data theft could have been prevented
Review economic benefits
Q & A
Speaker: Jonathan Halstuch, CTO at RackTop Systems