Training

Events , Governance & Risk Management , Insider Threat

The Other Insider Threat

The Other Insider Threat

There's a lot of talk about the malicious insider, but not as much about the unintentional insider. Whether its employees using personal software to simply get the job done or teams selecting and expensing unauthorized software, company information assets are increasingly difficult to manage. The cloud has brought many great things with it, but it has also created a new form of shadow IT that has the potential for much more devastating consequences than ever before.

Attend this session to learn:

  • What unintentional insider threat looks like;
  • Hear first-hand examples of unintentional insider behavior;
  • Strategies for identifying and managing the other insider threat.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.