+1-202-802-9399 (US)

Overcoming the Insider Threat: A government agency’s greatest security vulnerability

Detecting insider threats is one of biggest cybersecurity challenges for any organization, and preventing insider abuse remains one of the top cybersecurity issues identified by the National Counterintelligence and Security Center (NCSC). Government data is a special target because of its value to a wide variety of interested parties including non-friendly states, media, corporations, financial institutions or other groups that would use the data for competitive advantage, financial gain or political leverage.

Join Thycotic security expert and product manager, Ben Yoder as he explains the who, what, when, where, and why of insider threats including:

  • Threat actor motivators
  • How malicious insiders gain access to the “keys to the kingdom”
  • How to protect your agency’s critical data from insider abuse

All registrants will receive a free copy of “PAM Solutions for Federal Agencies” solution brief.

 

SHARE THIS


The following two tabs change content below.

Jordan True

Jordan is a social media strategist, digital community manager and a lover of all things IT. She currently manages the Social Media Program at Thycotic and loves to connect with technology communities online and at enterprise IT events. Addicted to the outdoors, you can find Jordan on the running trails in her free time or sharing the latest InfoSec buzz on Twitter @ThycoticJordan.
ISC-CPE Credit LogoInterested in CPE Credit for attending? Please provide your (ISC)2 ID certificate number when you register. You will then automatically see your CPE credit added to your (ISC)2 account within 4-6 weeks. Note, most Thycotic webinars qualify for 1 CPE credit.

Watch the Webinar