Webinar "COVID-19: Bringing Insider Threats into Focus"

September 23, 11:30am, CDT - 12:30pm, CDT


Non-member Price: 
Member Price: 
Student Price: 


Please register for this FREE webinar on Sep 23, 2020 11:30 AM CDT.  After registering, you will receive a confirmation email containing information about joining the webinar.

Presenter: Steve Given, CISO, Director of Security Risk and Compliance Services at Pileum Corp. 

The threat of attack from insiders, or an insider causing harm without malicious intent, is real and substantial. In a recent report it was noted that 34% of breaches were caused by insiders, up from 25% just 2 years prior. Average cost of an insider breach is rising about 15% per year. In 2019 that number was $1.6MM. Historically, organizations have focused on external-facing security mechanisms, such as firewalls, intrusion detection systems, and electronic building access systems.  

Insiders have a significant advantage over external attackers. They are not only aware of their organization's policies, procedures, and technology; they are also aware of its vulnerabilities (for example, loosely enforced policies or exploitable flaws in networks). A malicious insider can even be the one who configured the organization's security measures. The sudden adoption (or expansion) of work from home technologies due to COVID-19 has increased the potential for gaps in the security program. (i.e we've introduced more risk).

We will discuss what/who is an insider threat, types of insider threats, risk management goals, types of insider activities and some considerations for addressing the insider threat issue. The objectives of the webinar will be the following:

*       Analyze the cybersecurity impact brought on by COVID-19 and the rapid adoption of work from anywhere solutions

*       Help attendees identify potential risks for insider threat in their own organizations

*       Help attendees understand how to consider insider threats in their organizational risk management and security programs

*       Help attendees recognize potential processes and controls to mitigate the threat.