Insider incidents have increased by 47% over the past two years, leaving US companies facing an average of 2,500 internal cyber security breaches daily.
As innocent as it may seem, installing an application on a company laptop or sharing login credentials can put your business at risk of a security breach.
According to a recent CISA report, only 36% of the organizations that participated in an Insider Threat Report said that they are able to detect an insider attack within hours. Even less, only 27% said they are able to respond to and recover the situation within the same amount of time, this is critical and needs serious discussion.
During this roundtable discussion, we will focus on insider threats in cybersecurity, including the different types of threats and preventive measures businesses and organizations from the public and private sectors can take to keep your sensitive data safe and secure.
- What is an insider threat?
- How is an insider threat different from an outside-in-advanced targeted cyber-attack?
- What types of insider threats are there in cybersecurity?
- How do you ensure that your company can stay on top of cybersecurity threats?
Our selected panel of experts will discuss some of the best practices for cybersecurity regarding the company’s rules, frameworks, systems, and recommendations.
Is Zero trust the best approach?