Fighting the Insider Threat: Privilege Management and Abuse Prevention Strategies
- Tuesday, June 10 at 1:00 PM EDT (17:00:00 UTC)
- John Pescatore, Michael Crouse
You can now attend the webinar using your mobile device!
CEOs and CIOS across the country are keenly aware of the insider threat, where users abuse their access to the company's intellectual property, corporate or customer data and ultimately impact their bottom line. The risk is present across many industries, from financial services to energy and health care. Concern in the commercial market is growing. In the 2014 Ponemon study of Privileged User and Insider Threat, 88% of of IT practitioners think the risk posed by privilege access users will continue to grow or stay the same over the next 12 to 24 months. In addition, recent incidents in the federal government illustrate that privileged user risk is becoming a major concern as it relates to national security. The government has recently issued several policy memos that underscore the renewed sense of vigilance surrounding the issue of privileged user abuse.
This SANS Ask the Expert session will provide an overview of the most relevant findings from the Ponemon Survey and provide guidance and advice on how to mitigate the risks of privileged user access without impacting your company or agency's ability to collaborate and innovate.
John Pescatore (Director Emerging Security Trends, SANS Institute) is a former vice president and Distinguished Analyst at Gartner. Pescatore has over 30 years of experience in computer, network and information security. Prior to joining Gartner, he was senior consultant for Entrust Technologies and Trusted Information Systems and a Security Engineer for the U.S. Secret Service and the National Security Agency.
Michael Crouse is director of insider threat strategies for Raytheon. In this role Mr. Crouse oversees the execution of existing federal and commercial cyber audits/antimalware requirements programs, while identifying new, global growth opportunities within the Department of Defense (DoD)/Intelligence Community (IC) and the private sector. He works closely with top government decision makers and lends key influence in helping them develop new network security policies, specifically with regard to audit requirements and the detection and mitigation of insider threats.