Defense and Response Against Insider Threats & User Errors

Your cybersecurity team  has a strategy for preventing hackers from cracking critical systems and data from the outside. But do you have a clear strategy for preventing internal leaks, whether malicious or accidental? And do you have a plan for responding to suspected leaks?  In this webinar, industry experts will discuss the key strategies, processes, and technologies that enterprises need to mitigate the most damaging data breaches of all -- the ones created by trusted users.

On Demand
1h 00min

Attend this webinar and you'll:

  • Get an overview of the most common ways that insiders leak enterprise data
  • Learn the processes used to stop data leaks, particularly those that are accidental
  • Become familiar with tools that can be used to prevent insider leaks
  • Hear about the practices you can use to respond to an insider data leak
  • Receive recommendations on how to stop end users from leaking critical data

Featured Speakers

  • Dan Costa
    Dan Costa
    Deputy Director of the National Insider Threat Center
    CERT Division of the Carnegie Mellon Software Engineering Institute

    Dan Costa is the Deputy Director of the National Insider Threat Center in the CERT Division of the Carnegie Mellon Software Engineering Institute. Dan leads the research and engineering efforts for the CERT National Insider Threat Center, where he and his team conduct empirical research and analysis to develop solutions that combat insider threats. Dan and his team design, develop, and transition tools, algorithms, and exercises that enhance organizations’ abilities to detect, prevent, and respond to insider threats. Dan has extensive experience evaluating insider threat programs, assessing organizations’ vulnerabilities to specific insider threats, and assisting with insider threat program building for a multitude of government and industry organizations. Dan specializes in researching and developing insider threat data collection and analysis techniques and won the best paper award at the 2014 Semantic Technology for Intelligence, Defense, and Semantics for his team’s work “An Insider Threat Indicator Ontology”. Dan has a background in computer science and software engineering, and is a Certified Information Systems Security Professional, an IEEE Certified Professional Software Engineering Master, and an adjunct faculty member and faculty advisor in the H. John Heinz III College at Carnegie Mellon University.

  • Todd Thorsen
    Todd Thorsen
    Director, Information Security, Risk Management and Compliance

    Todd Thorsen, CISSP, CISM and CIPP/US – is an Information Security leader with more than 10 years experience in a variety of roles. Todd’s passion for security developed at Target where he led the Enterprise Third Party Security and Privacy team. Currently, Todd is the Director of Information Security, Risk Management and Compliance at Code42 Software, Inc. In addition to his other security and compliance responsibilities, Todd is responsible for leading Code42's Insider Threat Risk Program.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By