How Do We Stay Ahead of Insider Threats?

How Do We Stay Ahead of Insider Threats?

Insider incidents have increased by 47% over the past two years, leaving US companies facing an average of 2,500 internal cyber security breaches daily.


As innocent as it may seem, installing an application on a company laptop or sharing login credentials can put your business at risk of a security breach.


According to a recent CISA report, only 36% of the organizations that participated in an Insider Threat Report said that they are able to detect an insider attack within hours. Even less, only 27% said they are able to respond to and recover the situation within the same amount of time, this is critical and needs serious discussion.


During this roundtable discussion, we will focus on insider threats in cybersecurity, including the different types of threats and preventive measures businesses and organizations from the public and private sectors can take to keep your sensitive data safe and secure.

  • What is an insider threat?
  • How is an insider threat different from an outside-in-advanced targeted cyber-attack?
  • What types of insider threats are there in cybersecurity?
  • How do you ensure that your company can stay on top of cybersecurity threats? 

Our selected panel of experts will discuss some of the best practices for cybersecurity regarding the company’s rules, frameworks, systems, and recommendations. 

Is Zero trust the best approach?

RTD 8.31.22 3 (jpg)


31 August 2022


11:00 AM - 12:30 PM PDT

01:00 PM - 02:30 PM CDT

02:00 PM - 03:30 PM EDT


Round Table Discussion


Cyber Security

Share this event

4102573_applications_facebook_media_social_icon (png)
4102586_applications_linkedin_social_social media_icon (png)
email-sharing-icon (png)