Главная
Study mode:
on
1
Intro
2
The Incident
3
The Damage Assessment
4
Support
5
Training
6
Periodic Reviews
7
Hiring Process
8
Lessons Learned
9
Vision It
10
Looking Forward
11
Questions
12
Data Sharing
13
Profiling
Description:
Explore a comprehensive analysis of insider threats in this 50-minute RSA Conference talk. Examine a real-world exfiltration case from the Department of State's Insider Threat Program, working backwards to identify critical intervention points. Learn how to build a trusted and mindful workforce, narrowing potential internal security risks. Gain insights into personnel security, human resources, cybersecurity, and insider threat management applicable to both government agencies and private organizations. Delve into topics such as incident response, damage assessment, training, periodic reviews, hiring processes, and lessons learned. Discuss data sharing, profiling, and future strategies for mitigating insider threats. Benefit from the expertise of Jacqueline Atiles and Gregory Collins as they share valuable insights on when and how to intervene in potential insider threat scenarios.

Insider Threats - When Is It Too Late?

RSA Conference
Add to list
0:00 / 0:00