Login
Insider Threats eSummit

Insider threats are categorized as some of the most difficult cyber threats to identify. Once inside a company’s network, malicious or unauthorized activity is harder to find, especially when the adversary leverages legitimate credentials and access rights. But how does your organization classify “insider” in the first place? Are you referring to rogue or disgruntled employees? Or does your definition include outsiders working with internal employees/contractors, or external threat actors who manage to pose as insiders by phishing or evading traditional security controls?

Before you can manage insider threats, you must define your adversary and then learn what tools, tactics, and processes that adversary is most likely to use against you. Attend MISTI’s eSummit to hear how top defenders are managing their insider threat programs, and learn tips and tricks for keeping your organization safe from these sneaky predators. 

 

 

(ISC)² members: (ISC)² members who attend MISTI virtual events or eSummits may be eligible for one CPE credit each applicable webcast subject to (ISC)² approval. Please refer to (ISC)² Guidelines before reporting CPE activity directly on www.ISC2.org

 

Event Registration

To start registration, please enter your details below and click Continue.

Email    
Visit us on:
Follow us on Twitter Join us on Facebook Join us on LinkedIn
REGISTRATION IS FREE
  • FULL DAY OF SESSIONS
  • WHITEPAPERS
  • CASE STUDIES
  • NETWORKING

Attendance earns CPE credits!