This session will focus around steps every organization can take to implement a successful insider threat program. Every complete insider threat program contains these elements: policies, processes, technology controls, risk management and auditing/monitoring. If there's a unifying message within all of the steps of an insider threat program is that it is not about technology - it is about people and technology.
That's because a purely technology-based program does not translate to successful insider threat protection. It translates to status quo. You cannot simply react to some disaster (either an internal one or an incident you've read about) in kneejerk fashion and conclude, \Hey! We need an insider threat program. Let's call up a vendor and get a couple products in here." That is not an insider threat program. That is status quo. Obviously, IT plays a dominant role. But as a lead collaborator, not a dictator. IT works in perfect alignment with business-side executives and users to address all of the protective checkpoints while not disrupting productivity and/or hurting your reputation/brand strength with customers. Mr. Velez will go into detail of what he considers are the nine steps that every organization must take if they want to have a successful insider threat program.