Insider Risk

Building An Insider Threat Program

On-Demand Webinar

Developing and executing an Insider Threat Program that aligns with corporate values and data sources, brings about some unique challenges and concerns.

Join Insider Threat expert, Jim Henderson from the Insider Threat Management Group and Nick Cavalancia from Techvangelism as they discuss:

  • Identifying key stakeholders
  • Defining an insider threat
  • Defining your organization’s critical assets and vision for the insider threat program
  • Securing executive buy-in and establishing responsibilities
  • Developing tactical plans for implementing the program
  • Standing up an insider threat program office and identifying an analytics tool to enhance detection capabilities
  • Executing training and communication about the program
Nick Cavalancia

Nick Cavalancia

Chief Techvangelist

Nick Cavalancia has over 20 years of enterprise IT experience, 10 years as a tech marketing executive and is an accomplished technology writer, consultant, trainer, speaker, and columnist.

Jim Henderson

Jim Henderson

CEO - Insider Threat Defense

Mr. Henderson developed and teaches the highly sought after Insider Threat Program Development-Management Training Course, related training, and also provides Insider Threat Risk Management Services.

Get Instant Access

Employee Monitoring Resources

The Human Centric Approach to Data Loss Prevention

The Human Centric Approach to Data Loss Prevention

In today’s work-from-anywhere organization, a data loss prevention (DLP) strategy is more essential than ever. A critical part of DLP strategy is to understand the intent behind why people move files, email spreadsheets, print documents and upload files outside your...

Strengthening Your Insider Risk Program

Strengthening Your Insider Risk Program

Insider risk has increased 47% in the past two years. Theft, data leakage, hacking - insider risk is a real threat to your bottom line. It comes from employees and others granted access to your internal systems, and most companies do not have the technology or...