Click here to register

Date: Wednesday, July 9, 2014
Time: 2:00 PM ET / 11:00 AM PT

Your organization has a 50% likelihood of experiencing an insider incident despite deep investments in IT security. Insider threats include fraud, theft of intellectual property, data breaches and leaks, or malicious damage to IT resources. Most organizations that experienced an insider incident indicate it was more damaging than incidents involving hackers. You need the right plan and the right tools to detect, respond and recover from an insider incident.

In this 60 minute webinar you will hear:

•  Effective approaches to detect and address insider threats.

•  Research and resources from industry experts to help you prepare and react.

•  Best practices from years of hands-on experience and client engagements.

SpectorSoft will present a practical approach to user activity monitoring and forensics through its deter, detect and detail methodology. Coordinated Response will examine key elements of an effective incident response plan that addresses the special circumstances associated with insider threat.

The Verizon data breach investigations report indicates that any breach, insider or otherwise, if found early is 80% less likely to result in damage. Attend this webinar and learn how to find them early and fix them fast.

Speakers:
Jim Meyer, Managing Director, Coordinated Response
Mike Tierney, COO, SpectorSoft

Sponsor: