What is Reinforcement Learning (RL)? Definition, Algorithms, Examples
How has the insider threat changed? What are the new insider threat profiles and how can you address them? Do you understand your exposure and know where your risk is? In this brand-new, 3-part podcast series The Inside Line on Insider Threats with Proofpoint, cybersecurity experts come together to talk about insider threat management (ITM).
Joining Dr. Eric Cole, Founder and CEO of Secure Anchor Consulting, for the final episode of the series is Rob Bolton, Senior Director, Information Protection at Proofpoint. The two begin by reflecting upon the first two episodes, thinking back to the different types of insider threats and the strategies to combat them and, more significantly, looking at what an insider threat program means in terms of costs, economic benefits, and how it can reduce operational risk. Following on from this, Rob spotlights the direct and indirect impact of insider threats from a financial perspective, including the key drivers of costs. Conversation then moves on to how insider threat management programmes deliver economic value and ROI and the roles integrated technologies play in reducing insider costs and mitigating risk. To close, Eric and Rob share their thoughts on the best practices for building a modern insider threat program, before analysing some Proofpoint use case examples.
Join 34,209 IT professionals who already have a head start
Meet the panel
Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation
Fivetran: The Biggest Challenges Facing Data Leaders Today - And How to Solve Them
Informatica: Harnessing Data, AI and Cloud for a 360-Degree View of your Business
Zero Networks: Reinventing Identity Security
Fivetran: Modern Data Leader’s Guide to Improved Customer Outcomes
Radware: 360 Application Protection and Why Companies Need It
HID Global: Choosing the Right Visitor Management Solution
Huntress: Doing More With Less in Your Cybersecurity Strategy
Savvy: SaaS Identity Discovery and Visibility
Sifflet: Data Observability 101