Insider threats are on the rise. According to McKinsey, over 50% of data breaches in the past year involved an insider, whether full-time employee, part-time contractor, or strategic business partner. Managing insider threats fundamentally requires a people-centric approach.

In this session, you will learn:

• The key value propositions of Insider Threat Management (ITM) solutions: managing user risk, detecting insider-led data breaches, and accelerating incident response
• The ITM tools that organizations can leverage to improve their risk posture and reduce the possibility of insider-led data loss—with real-life case studies to illustrate
• The different types of insider threats, and how understanding the full context helps resolve incidents faster
• Steps you can take to build your own successful ITM program

We will also cover actionable strategies to manage your organisation's risk, including the value of a technology-enabled ITM program.

Generously Supported By:

supported by logo
Speakers
speaker photo
Aruna Sreeram
Sr. Director of Product Management, Proofpoint

Aruna Sreeram is a product and technology leader with more than 15 years in cybersecurity, IOT industry and technology start-up companies.  At Proofpoint, Aruna is responsible for strategic leadership of the ObserveIT endpoint solutions. She served as a Director of Product Management at Leidos leading products in Insider Threat Management and Cybersecurity solutions for Critical Infrastructure.  Her previous positions include technical leadership positions at Axeda, RSA and Houghton Mifflin.  Aruna has a Master’s in Information Technology from the Harvard Extension School and a Master’s in Business Administration.

speaker photo
Mike Muscatell
Sr. Manager InfoSec, Krispy Kreme

Mike Muscatell is a seasoned IT veteran with more than thirty years in the Information Technology field, twenty of those years in the Information Security field. Early on in his career he successfully developed the first IT operations center in ’95 at NationsBank / Bank of America. He developed the Information and Cybersecurity Program for Snyder’s-Lance Inc. where he is the Information Security Manager. He is a certified ethical hacker and a certified penetration tester. He has been honored as one of the top 100 professionals in the Information Security Field by Strathmore's Who's Who for 2014 and also featured in Food Engineering Magazine discussing The Cyber Threat. Mike belongs to a number of security organizations including Infragard, US Chamber of Commerce Cyber Committee, and The International Cyber Threat Task Force where he is a member of the Cyber Council.