How is User Risk Mitigation achieved? Achieving user risk mitigation-stopping the insider threat

  • Webcast Aired Friday, 10 Jun 2016 11:00AM EDT (10 Jun 2016 15:00 UTC)
  • Speakers: Dr. Eric Cole, Daniel Velez

Clearly, traditional security tools - while still playing a key role in safeguarding systems - no longer suffice as a sole remedy. IT purchase decision-makers and their tech teams must acquire solutions which enable them to match technology with human oversight, paving the way for 24/7/365 visibility into how users behave, no matter when or where they're connecting to the network. Then, they have to prioritize each risk and launch remediation/mitigation measures. Relatively few organizations have ascended to this level of a protected state. But they can get there - with less time and cost investment than they realize - to the benefit of their information assurance and business strategies. In this webinar, Daniel Velez, Forcepoint's Director of Insider Threat Operations and Dr. Eric Cole, Fellow SANS Institute discuss what it means to have total risk awareness in 2016. This includes:

  • A breakdown of some risky user behaviors you've seen before and some you haven't.
  • Finding the \why" behind the "what."
  • Analysis of the biggest causes of endpoint security threats.