Protecting Enterprise Data from Malicious Insiders

It’s a sad truth: not all employees are nice. Corporate espionage, sabotage and other security incidents could be committed or aided by any insider with something to gain. How do you know when a once-trustworthy employee is about to do something malicious? How can you identify anomalous behavior among your users? Most of all, how can you prevent employees from taking cyber actions that might hurt your enterprise’s business? In this webinar, experts discuss methods for detecting and mitigating malicious insider threats, and for preventing users from using their trusted positions to threaten your data.

On Demand
1h 00min

Attend this webinar and you'll:

  • Learn how to spot the signs of a malicious insider
  • Find out how to identify anomalous behavior early - before damage is done
  • Gain insights on how to structure your environment to keep it guarded from malicious insiders
  • Get ideas for safeguards you can put in place today to protect against malicious insiders

Featured Speakers

  • Corey Jackson
    Corey Jackson
    Founder and President

    Founder/President of SACRO, LLC a Cybersecurity Advisory Firm – former Fortune 150 Chief Information Security Officer (CISO), is a technology executive with a proven track record and business acumen in defining global cybersecurity and risk strategies. Mr. Jackson’s career, highlighted by stellar credentials, accolades, and partnerships serves as a trusted advisor positively influencing corporations, academia, and elected officials, providing value-added guidance and results-oriented execution. As a visionary leader, Corey brings more than 25 years of corporate and government experience. Corey has advanced the awareness of cybersecurity accountability amongst C- Suite and Board level leaders within several Fortune 500 companies. Former VP Technology Risk and Deputy CISO of The Travelers Companies, he has also served as VP & Global CISO of HollyFrontier Corporation, Interim CISO and Deputy CISO at Kimberly-Clark, CISO for GE Current & Lighting, and held multiple cybersecurity and risk-related roles within the Federal Bureau of Investigation (FBI), Internal Revenue Service (IRS), and US Department of State – Bureau of Diplomatic Security. His experiences as a practitioner, past gubernatorial appointment (Commonwealth of Virginia), and his proven results provide astute knowledge in global, regulatory, and strategic imperatives to enhance IT and OT cyber-alliances. Mr. Jackson, currently a PhD candidate, holds several degrees and certifications which include the CISSP, MBA from Keller Graduate School of Management, and post-degree Information Security Certificates from Georgetown University and Carnegie Mellon University.

  • Rajan Koo
    Rajan Koo
    Chief Customer Officer
    DTEX Systems

    Raj is responsible for enterprise customer success, managing Dtex installations, services, and implementation at some of the top enterprises in the world. This includes critical tasks such as developing custom architecture for customers, specific needs, or scaling Dtex across hundreds of thousands of users. As a Chartered Professional Engineer with over 15 years of engineering experience, Raj has been awarded patents for his work in R&D and has led technical reviews for multi-million-dollar industrial automation projects. Raj drives focus to deliver projects from conception to implementation. He believes in fostering learning and knowledge sharing within his team and that lifetime learning is integral to innovation.

  • Terry Sweeney
    Terry Sweeney
    Dark Reading

    Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. Sweeney has covered enterprise networking extensively, as well as its supporting technologies like storage, wireless, cloud-based apps and the emerging Internet of Things. He's been a contributing editor to The Washington Post, Crain’s New York Business, Red Herring, Information Week, Network World,, and Stadium Tech Report.

Sponsored By