10 ready-to-implement PowerShell scripts to make AD management easy!

Webinars

How to combat insider threats in 2021

Forrester researchers predict that the remote-workforce trend will drive a steep rise in insider threats. The report says, insider threats are already responsible for 25 percent of data breaches and in 2021 that percentage is expected to jump to 33 percent. While “regular” insiders may turn malicious for a variety of reasons but 2021 can expect to see threats emerge from unexpected sources.

Insider threat prevention best practices are continually evolving as the nature of threats evolves. While nothing is ever foolproof, federal agencies such as NIST, National Insider Threat Task Force and other insider threat guidance sources indicate that when properly implemented, an insider threat mitigation strategy can act as a powerful combatant to insider threats. NIST provides a mapping of risk-based security controls which can help organizations create a blueprint for an insider threat program.

Key takeaways include:

  • Aligning human behavior to an insider threat using user and entity behavior analytics (UEBA)
  • Developing a data-driven approach to insider threat
  • Creating a policy-driven insider threat mitigation program with Zero Trust

Presented by

Jay Reddy, Sr. Technical Evangelist.

A sought-after speaker on the latest IT trends in international conferences and seminars. Authored numerous e-books and research studies that help business leaders with insight and advice on leveraging the latest technology for better IAM and cybersecurity.

Watch Now

Related posts
Webinars

Top 5 identity and access management challenges of 2021 and how to overcome them

Webinars

A 5-Step Cybersecurity Strategy for Your Organization

Webinars

Prevent Active Directory password attacks - Steps and Tools

Webinars

What is NIST Cybersecurity Framework (CSF) and how to align with its five core functions?

×

There are over 8,500 people who are getting towards perfection in Active Directory, IT Management & Cyber security through our insights from IAMRoundup.

Wanna be a part of our bimonthly curation of IAM knowledge?

  • -Select-
  • By clicking 'Become an insider', you agree to processing of personal data according to the Privacy Policy.