Insider Risk

Managing Insider Risk vs. Insider Threats

On-Demand Webinar

With so much focus on actual threats today, organizations are focusing on reactive technologies and processes that are based on the premise that an attack will be successful. But in the case of insiders (including external threat actors using compromised employee credentials), it’spossible to manage the risk of insider-based attacks well-before they ever become a threat.So, how can you shift your insider threat program to first manage insider risk

In this educational webcast, join cybersecurity expert and Microsoft MVP, Nick Cavalancia, as he discusses:

  • Insider Risk vs. Insider Threats: What’s the Difference?
  • What it takes to focus on insider risk instead of threats – and what’s the result?
  • Shifting your program, processes, and plans to focus on managing insider risk

You’ll also hear from Suzanne Parent, from Veriato, as she shows  practical ways to measure insider risk and how to formulate an appropriate plan of action.

Nick Cavalancia

Nick Cavalancia

Chief Techvangelist

Nick Cavalancia has over 20 years of enterprise IT experience, 10 years as a tech marketing executive and is an accomplished technology writer, consultant, trainer, speaker, and columnist.

Get Instant Access

Employee Monitoring Resources

The Human Centric Approach to Data Loss Prevention

The Human Centric Approach to Data Loss Prevention

In today’s work-from-anywhere organization, a data loss prevention (DLP) strategy is more essential than ever. A critical part of DLP strategy is to understand the intent behind why people move files, email spreadsheets, print documents and upload files outside your...

Strengthening Your Insider Risk Program

Strengthening Your Insider Risk Program

Insider risk has increased 47% in the past two years. Theft, data leakage, hacking - insider risk is a real threat to your bottom line. It comes from employees and others granted access to your internal systems, and most companies do not have the technology or...