Time
1 hour 5 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:00
of participating in the group. Okay. Your it wig?
00:10
Yeah. It is still
00:12
the insider threat Working group. The it twig fun acronym. No need to thank me. You're welcome. Is a group.
00:18
Is the group from an insider incident? Think about
00:24
I thought to love. So be sure they're comfortable with the time commitments of participating in the group. Okay, Your
00:35
you don't want to have your goals undermined by too many competing priorities.
00:41
I am supposed to say this one
00:46
to get executive buy in. You'll have to be.
00:53
I was gonna say it week. Having an insider incident
00:58
inside are good or lower. The clearly shows the risks from
01:07
sure. This user could also use some more training about proper to
01:15
by promoting their project in the reports in their reports, by promoting their project in their reports. So to get insect's etten,
01:26
And for that, you'll need an executive risk assessment.
01:30
To be clear, this isn't a risk assessment of
01:38
I'm going to stop talking,
01:40
but let's hear from pewter ho slaughtered his name before I started.
01:45
Sorry, Peter, Once the investigation has begun, evidence should be collected and retained. But are you using a sim or sore tool, for instance. What? Monitoring or auditory auditory auditing? Can you hear the data being expatriated?
02:04
Think about the security objectives and programs in your organization
02:08
with two for the realities of the collaborative Fort whole. Who's got past the
02:16
I think I was supposed to say that last part,
02:23
uh

8 Steps to Building a Modern Insider Threat Program

In this course brought to you by Industry Leader Code42, we will cover the 8 crucial steps necessary to build a modern insider threat program for your organization.

Instructed By

Instructor Profile Image
Alex Matheson
Instructor