Third-party risk

Build an insider threat management program that involves everyone

July 13, 2021
The International Monetary Fund holds a Zoom call last fall about forging closer ties with Africa. Today’s columnist, Deborah Watson of Proofpoint, says with so much work conducted via virtual meetings, risk has increased and businesses have to pay more attention to an insider threat management program. InternationalMonetaryFund CreativeCommons CC BY-NC-ND 2.0
  • User risk profiling: Identify and manage users based on their risk profile to increase efficiency and support data minimization and monitoring proportionality requirements.
  • Cross-Channel visibility: Establish a unified view of how users interact with data on endpoints, cloud apps, social media, file-sharing services, and email.
  •  Activity timelines: Build an intuitive visualization of user activity over time to understand the critical context around security alerts to make better-informed and actionable decisions.
prestitial ad