• Days
  • Hours
  • Minutes
  • Seconds


Awareness | Build | Change
The ABC's of
insider threat management.


Available on Demand

The risk of insider threats is real: here’s what you need to know

Insider threats have been recognised as a growing risk over the years. The massive shift to remote working, combined with the accelerated digital transformation efforts, that lean on cloud-based applications, presents a very real challenge in effectively managing insider threats.

Watch this lively 60-minute session where we will discuss real-world examples of insider threats – caused by negligent, malicious or compromised users – and explore how these threats have evolved in both causation and impact.

In this session, you will learn:
  • What are the best practices to identify and address insider threats
  • Why contextual intelligence is important to establish intent
  • How key response strategies can reduce time and costs to mitigate risk
  • Why legacy security tools are unable to address insider threats


Get your thank you gift for attending!

Attendees will receive a copy of the Frost & Sullivan Insight Report - Building a Business Case for Insider Threat Management: The Cybersecurity Leaders Guide to Understanding, Communicating and Mitigating the Risk.

 

Rutrun Vehicula Fermentum Lacinia Enim

MEET THE SPEAKERS


Renee Murphy
[GUEST SPEAKER]
Renee Murphy | Principal Analyst, Forrester Research

Renee is a principal analyst at Forrester serving Security & Risk Professionals. She covers governance, risk, and compliance (GRC), with a special focus on audit, controls management, information security, and risk management.



Andy Rose
[HOST SPEAKER]
Andrew Rose | Resident CISO, Proofpoint EMEA

Andrew Rose is Resident CISO for the EMEA Region at Proofpoint, where his is responsible for driving Proofpoint’s people-centric security vision, strategy and initiatives.


Available On Demand

How to build a detection and response strategy for insider threats

It’s common for organisations to spend time investigating external cyber threats, including understanding the motivations, intent, and capabilities of attackers. But this level of effort is rarely employed when it comes to internal threats. Insider threats are a significant and underinvested problem, and it is crucial for organisations to adopt a people-centric approach to cybersecurity to better protect their data.

Watch this 30-minute webinar where our experts will deep dive into customer case studies and explore how companies have built successful ITM programs with governance and incident response processes, collaboration across teams, and strong detection and prevention technology.

In this session, you will learn:

  • How to address data loss from negligent, malicious, or compromised users
  • Why contextual intelligence is important to establish intent
  • How to accelerate incident response and triage what really matters
  • Why legacy security tools are unable to address insider threats



Get your thank you gift for attending!

Attendees will receive a copy of the Frost & Sullivan Insight Report - Building a Business Case for Insider Threat Management: The Cybersecurity Leaders Guide to Understanding, Communicating and Mitigating the Risk.

Rutrun Vehicula Fermentum Lacinia Enim

MEET THE SPEAKERS


Chris Rossignol
Chris Rossignol | Cybersecurity Expert, Proofpoint EMEA

Chris Rossignol is an Insider Threat Specialist at Proofpoint, part of the Information Protection Business Unit. Originally from Boston, US but now based in the UK, Chris has 10 year’s experience in cybersecurity, and technology services working with large enterprises, to partner with customers, to drive change and solve their security challenges.



Jake Wardell
Jake Wardell | Solutions Architect, Information Protection, Proofpoint EMEA

Jake Wardell is a Cyber Security Expert with over 10 years’ experience. He enjoys the challenge of working on complex technical solutions that help organisations to secure their data. Prior to Proofpoint, Forcepoint, Symantec and HP.


Available on Demand

How to get stakeholder buy-in for insider threat management

Most security leaders know that insider threats are a serious and evolving cybersecurity risk. But many struggle with communicating those risks to other executives and getting buy-in to make investments that count.

Watch this 30-minute webinar on how to build a compelling business case for Insider Threat Management. In this session we will explore why executives, IT, legal and security operations teams aren’t always aligned on the risks of insider threats and how to best manage them.

In this session, you will learn:

  • How insider threats have evolved in an era of distributed work
  • The three main obstacles to funding insider threat management programs
  • How to tailor insider threat programs to business outcomes
  • How to ensure Insider Threat Management is a c-level imperative


Get your thank you gift for attending!

Attendees will receive a copy of the Frost & Sullivan Insight Report - Building a Business Case for Insider Threat Management: The Cybersecurity Leaders Guide to Understanding, Communicating and Mitigating the Risk.


Rutrun Vehicula Fermentum Lacinia Enim

MEET THE SPEAKER


Andrew Rose
Andrew Rose | Resident CISO, Proofpoint EMEA

Andrew Rose is Resident CISO for the EMEA Region at Proofpoint, where he is responsible for driving Proofpoint’s people-centric security vision, strategy and initiatives.

In the words of one security leader, “If any company thinks they don’t have an insider threat problem, they aren’t looking.” - Forrester 2021 – Best Practices for Mitigating Insider Threats analyst report

____________

Insider threats have been recognised as a growing risk over the years. The massive shift to remote working, combined with the accelerated digital transformation efforts, that lean on cloud-based applications, presents a very real challenge in effectively managing insider threats. 

In this exclusive live series, we go through the ABC's of insider threat management, including a deeper dive into topics such as how key response strategies can reduce time and costs to mitigate risk, the three main obstacles to funding insider threat management programs, how to ensure insider threat management is a c-level imperative, amongst many others.