5 New Technologies Transforming the Supply Chain
How has the insider threat changed? What are the new insider threat profiles and how can you address them? Do you understand your exposure and know where your risk is? In this brand-new, 3-part podcast series The Inside Line on Insider Threats with Proofpoint, cybersecurity experts come together to talk about insider threat management (ITM).
Joining Dr. Eric Cole, Founder and CEO of Secure Anchor Consulting, for the final episode of the series is Rob Bolton, Senior Director, Information Protection at Proofpoint. The two begin by reflecting upon the first two episodes, thinking back to the different types of insider threats and the strategies to combat them and, more significantly, looking at what an insider threat program means in terms of costs, economic benefits, and how it can reduce operational risk. Following on from this, Rob spotlights the direct and indirect impact of insider threats from a financial perspective, including the key drivers of costs. Conversation then moves on to how insider threat management programmes deliver economic value and ROI and the roles integrated technologies play in reducing insider costs and mitigating risk. To close, Eric and Rob share their thoughts on the best practices for building a modern insider threat program, before analysing some Proofpoint use case examples.
Meet the panel
Keyfactor: Why You Need to Care About Machine Identity
Intermedia: Cloud Migration is the Key to Enterprise Communications
Radware: Bot Mitigation is Key for Application Protection
Informatica: How Shifts in the Cloud are Changing the Game
Sifflet: Observability and the Future of Data Engineering
Safe Software: Low-Code/No-Code in Data Engineering
Egnyte: Keeping Up With The Next Generation of Data Privacy
Genestack: Why Data Management is the Key to Success in Life Sciences
Informatica: 4 Powerful Reasons Why Your Organization Benefits with Data Sharing
ManageEngine: Thinking Beyond ITSM and Achieving Enterprise Automation