Do you have an insider threat program in your organization? Insider threats are one of the top ten threats facing organizations today. Learn how to detect insider threats and how to deploy countermeasures to protect against them.
Insider threats are growing and the impact from often over-looked insider threats can threaten organizations. You need to be on the lookout for an increasing number of accidental breaches by employees storing confidential data on unsecure cloud storage. In this course, Cybersecurity Threats: Insider Threats, you'll learn how serious the risk is from insiders, how insiders can threaten an organization, and how to protect against them. First, you'll explore how to detect both a malicious and an accidental insider threat. Next, you'll discover how to respond and contain an insider incident. Finally, you'll learn the best practices and countermeasures you can deploy to help protect your organization from insider threats. By the end of this course, you'll have learned how to approach the insider threat, and be able to prepare your insider threat plan, including detection, containment, and prevention measures to protect your organization.
Richard has worked for over 20 years in various technology management roles working in card payments and regulated financial sectors. He spent several years deploying niche payment card solutions in Europe and more recently as CIO, serving the US mortgage sector. Richard specializes in IT Risk and Information Security management.
Course Overview Do you have an insider threat program in your organization? Both the Verizon Data Breach Investigation Report and the ENISA annual Threat report have insider threats as a top 10 threat facing organizations today. Hi, my name is Richard Harpur, and welcome to my course, Cybersecurity Threats: Insider Threats. Accidental insiders are frequently forgotten when assessing risks within organizations. Malicious insiders are intent on personally gaining at the expense of the organization. Every organization has risks from both of these types of insiders, and I will teach you how to address that risk. I'm going to start by showing you why the insider threat is so important and the damage that can be cause from an insider threat. As we progress through this course, you will learn how to recognize and detect insider threats, what motivates a malicious insider to attack your organization, how best to detect insider threats and suspicious behavior, and what approaches you should take when you need to respond to an insider incident. Finally, what countermeasures can you put in place to defend your network from insider attacks? By the end of this course, you will be fully informed and know what to do to defend your systems from insider incidents. I hope you join me on this course to learn all about Cybersecurity Threats: Insider Threats at Pluralsight.