$400 Amazon Gift Card with OnDemand Training through March 10 - Learn More!


To attend this webcast, login to your SANS Account or create your Account.

This webcast has been archived. To view the webcast login into your SANS Portal Account or create an account by clicking the "Get Registered" button on the right. Once you register, you can download the presentation slides below.

Managing the Insider Threat: Why Visibility Is Critical

  • Tuesday, June 18, 2019 at 1:00 PM EDT (2019-06-18 17:00:00 UTC)
  • Sai Chavali, John Pescatore


  • ObserveIT

You can now attend the webcast using your mobile device!



It's no secret that limited visibility into user actions keeps cybersecurity professionals up at night. Without visibility into user and file activity, how do you know if your trusted insiders (your employees, vendors, and contractors) are maliciously or inadvertently compromising sensitive information? Can your existing systems tell the difference, and deliver intent-clarifying context?

Join us to learn:

  • The key components to gaining full cyber visibility: user activity, data activity, and analytics
  • How to incorporate insider threat management best practices
  • How ObserveIT can help stem the risk of insider threat in your organization

Speaker Bios

Sai Chavali

Saikrishna (Sai) Chavali is a Security Strategist at ObserveIT where he is defining a new product category in the information security industry: insider threat management. Sai has expertise in growing and building information security products to protect data, applications and users across insider threat management and application security. Prior to his role at ObserveIT, Sai held product management positions at Veracode, where his products helped to reduce software vulnerabilities in web applications used by Fortune 100 enterprise companies and consumers all over the world.

John Pescatore

John Pescatore joined SANS as director of emerging security trends in January 2013 after more than 13 years as lead security analyst for Gartner, running consulting groups at Trusted Information Systems and Entrust, 11 years with GTE, and service with both the National Security Agency, where he designed secure voice systems, and the U.S. Secret Service, where he developed secure communications and surveillance systems and "the occasional ballistic armor installation." John has testified before Congress about cybersecurity, was named one of the 15 most-influential people in security in 2008 and is an NSA-certified cryptologic engineer.

Need Help? Visit our FAQ page or email webcast-support@sans.org.

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.