5 New Technologies Transforming the Supply Chain
How has the insider threat changed? What are the new insider threat profiles and how can you address them? Do you understand your exposure and know where your risk is? In this brand-new, 3-part podcast series The Inside Line on Insider Threats with Proofpoint, cybersecurity experts come together to talk about insider threat management (ITM).
Joining Dr. Eric Cole, Founder and CEO of Secure Anchor Consulting, in the second episode of the series is Brian Reed, Cybersecurity Evangelist at Proofpoint. This time, conversation turns to 'how to navigate insider risk' according to a recent report by Gartner. Brian begins by outlining the difference between the two often interchangeably used terms 'insider threat' and 'insider risk', before shedding light on the three main types of insider threat profiles and how organisations should address them. He also touches on how awareness training factors into reducing this risk and shares the valuable knowledge he learnt in his career transition from Gartner to Proofpoint. To end, Eric and Brian explore the steps organisations should take to set up and employ an effective insider threat program.
Meet the panel
Keyfactor: Why You Need to Care About Machine Identity
Intermedia: Cloud Migration is the Key to Enterprise Communications
Radware: Bot Mitigation is Key for Application Protection
Informatica: How Shifts in the Cloud are Changing the Game
Sifflet: Observability and the Future of Data Engineering
Safe Software: Low-Code/No-Code in Data Engineering
Egnyte: Keeping Up With The Next Generation of Data Privacy
Genestack: Why Data Management is the Key to Success in Life Sciences
Informatica: 4 Powerful Reasons Why Your Organization Benefits with Data Sharing
ManageEngine: Thinking Beyond ITSM and Achieving Enterprise Automation