Date: Friday, February 27, 2015
Time: 2:00 p.m. ET/ 11:00 a.m. PT
If it were as easy as looking at the wanted posters on the wall of the post office, anyone could identify an insider, round up a posse, and head them off before they damage the organization. Part of the challenge stems from the insider being inside the perimeter defenses already. The protective systems designed to keep external threats at bay are rendered ineffective once the “keys to the kingdom” are handed over. The vast majority of those handed the keys will use them to help drive the business forward. It’s only a small number of insiders that ever present as threats. How can you begin to identify them, and keep an eye on them, before they do?
During this webinar, we will discuss:
· 6 types of Insider, each with a different motivation
· Tips for identifying each type of insider, so you can make sure none are loose in your organization
Mike Tierney,COO, SpectorSoft