Top 10 Best DCIM Software Solutions for 2024
Proofpoint Episode 2: Navigating Insider Risk
![Proofpoint Episode 2: Navigating Insider Risk](/sites/default/files/styles/cropper_main_image/public/2021-04/Proofpoin2.jpg.webp?itok=Z3d35vBQ)
How has the insider threat changed? What are the new insider threat profiles and how can you address them? Do you understand your exposure and know where your risk is? In this brand-new, 3-part podcast series The Inside Line on Insider Threats with Proofpoint, cybersecurity experts come together to talk about insider threat management (ITM).
Joining Dr. Eric Cole, Founder and CEO of Secure Anchor Consulting, in the second episode of the series is Brian Reed, Cybersecurity Evangelist at Proofpoint. This time, conversation turns to 'how to navigate insider risk' according to a recent report by Gartner. Brian begins by outlining the difference between the two often interchangeably used terms 'insider threat' and 'insider risk', before shedding light on the three main types of insider threat profiles and how organisations should address them. He also touches on how awareness training factors into reducing this risk and shares the valuable knowledge he learnt in his career transition from Gartner to Proofpoint. To end, Eric and Brian explore the steps organisations should take to set up and employ an effective insider threat program.
Join 34,209 IT professionals who already have a head start
Meet the panel
![](/sites/default/files/styles/user_profile_picture/public/2021-04/2_2.png.webp?itok=fgbr8LCv)
Dr. Eric Cole
![](/sites/default/files/styles/user_profile_picture/public/2021-04/Brian%20Reed%20.png.webp?itok=T2hK19y2)
Brian Reed
Recommended Content
Trending Content
What is Engagement Farming and is it Worth the Risk?
![](https://em360tech.com/sites/default/files/styles/author_image/public/linkedinImages/user-picture-4489-1706648130914.jpeg.webp?itok=NigAG2DT)
Will TikTok Actually Be Banned? Exploring the US Congress Bill
![](https://em360tech.com/sites/default/files/styles/author_image/public/2023-12/profile-picture_0.jpeg.webp?itok=rtZQ0QtV)
Hackers Are Exploiting the UEFA Euros for Phishing Attacks
![](https://em360tech.com/sites/default/files/styles/author_image/public/linkedinImages/user-picture-4489-1706648130914.jpeg.webp?itok=NigAG2DT)
What is Roko's Basilisk? The Terrifying AI Thought Experiment Explained
![](https://em360tech.com/sites/default/files/styles/author_image/public/linkedinImages/user-picture-4489-1706648130914.jpeg.webp?itok=NigAG2DT)
Opentelemetry: The Key to Unified Telemetry Data
![](https://em360tech.com/sites/default/files/styles/default_logo/public/2023-10/Untitled%20design%20-%202023-10-19T093648.767.png.webp?itok=bwfm_sHX)