Key Learning Points
- Focus on risk-based, data-centric security strategies.
- Leveraging both data and behavioral analytics.
- Applying an optimal mix of People, Process & Technology.
- Identifying critical assets and assign ownership to form a coalition.
- Key pillars of success: Defend, Detect, Decide, Defeat.
Insider threats encompass more than just the obvious data breach. Many incidents are accidental and stem from broken processes. Join Todd Bursch, Forcepoint’s Office of the CISO, for this informative presentation on managing and mitigating insider threat and data loss risks within your organization.
About Todd Bursch
Todd Bursch has over 15 years of experience in the network & content security. Todd is CISSP certified and has authored patents for event-based single use credit card payment transactions.
This session sponsored by Forcepoint.