Join Our Mailing List Here

INsecurity Conference 2018 Schedule Builder

View, browse and sort the list of sessions by pass type, track, and format. Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Check back as we add more sessions soon.

Understanding, Detecting, and Mitigating the Insider Threat

Katie Burnell (Insider Threat Analyst, EMEA , Dtex Systems)

Date: Thursday, October 25

Time: 2:45pm - 3:45pm

Session Type: Track Session

Track: Operations and Practices

Vault Recording: TBD

Audience Level: All

Data leaks – whether malicious or accidental – can wreak havoc on your organization. What exactly are the chief insider threats, and who in your organization is responsible for creating them? How can you detect an insider who might be putting your critical information at risk, and how can you mitigate the threat? This session will delve into the different types of insiders you should watch for, their behaviors, and key methods for identifying them. Using real-world examples, the speaker will discuss the various ways that insiders can leak data, how those insiders were detected, and how the affected organizations mitigated further incidents.