The greatest cyber security threat an organization faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders - the contractors, vendors, privileged users and business users who already have full access to your company's systems and sensitive data. Addressing this type of threat requires a much different approach than addressing external threats; whether unintentional or malicious, organizations with sensitive customer data need to quickly identify and eliminate insider threat. Attend this session to learn best practices and real-life examples for building and maintaining an effective insider threat program.