Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Building a Successful Insider Threat Program

via YouTube

Overview

Learn how to build an effective insider threat program in this 45-minute conference talk from Central Ohio Infosec 2015. Explore user activity monitoring, insider threat definitions, and the importance of auditing. Discover the key components of a comprehensive program, including stakeholder involvement, technical observables, governance, documentation, and tool selection. Gain insights into malicious insider behaviors and develop an implementation plan to protect your organization from internal threats.

Syllabus

Introduction
Daniels background
User activity monitoring
Insider threat definition
Why arent we auditing
We should be auditing
Look real
What makes a complete Insider Threat Program
Hope is not a strategy
The Y document
The staff
Stakeholders
Malicious Insider
Technical observables
Governance and oversight
Documentation
Tool Selection
Implementation Plan
Questions

Reviews

Start your review of Building a Successful Insider Threat Program

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.