What is Reinforcement Learning (RL)? Definition, Algorithms, Examples
How has the insider threat changed? What are the new insider threat profiles and how can you address them? Do you understand your exposure and know where your risk is? In this brand-new, 3-part podcast series The Inside Line on Insider Threats with Proofpoint, cybersecurity experts come together to talk about insider threat management (ITM).
Joining Dr. Eric Cole, Founder and CEO of Secure Anchor Consulting, in the second episode of the series is Brian Reed, Cybersecurity Evangelist at Proofpoint. This time, conversation turns to 'how to navigate insider risk' according to a recent report by Gartner. Brian begins by outlining the difference between the two often interchangeably used terms 'insider threat' and 'insider risk', before shedding light on the three main types of insider threat profiles and how organisations should address them. He also touches on how awareness training factors into reducing this risk and shares the valuable knowledge he learnt in his career transition from Gartner to Proofpoint. To end, Eric and Brian explore the steps organisations should take to set up and employ an effective insider threat program.
Join 34,209 IT professionals who already have a head start
Meet the panel
Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation
Fivetran: The Biggest Challenges Facing Data Leaders Today - And How to Solve Them
Informatica: Harnessing Data, AI and Cloud for a 360-Degree View of your Business
Zero Networks: Reinventing Identity Security
Fivetran: Modern Data Leader’s Guide to Improved Customer Outcomes
Radware: 360 Application Protection and Why Companies Need It
HID Global: Choosing the Right Visitor Management Solution
Huntress: Doing More With Less in Your Cybersecurity Strategy
Savvy: SaaS Identity Discovery and Visibility
Sifflet: Data Observability 101