2019 Seattle Fraud & Breach Summit , Events , Governance

The Other Insider Threat

The Other Insider Threat

There's a lot of talk about the malicious insider, but not as much about the unintentional insider. Whether its employees using personal software to simply get the job done or teams selecting and expensing unauthorized software, company information assets are increasingly difficult to manage. The cloud has brought many great things with it, but it has also created a new form of shadow IT that has the potential for much more devastating consequences than ever before.

Attend this session to learn:

  • What unintentional insider threat looks like;
  • Hear first-hand examples of unintentional insider behavior;
  • Strategies for identifying and managing the other insider threat.


Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.