What is the best way to investigate the insider threat?

What is the best way to investigate the insider threat?

Is there a right way to deal with an insider threat investigation?

Thom Langford, Founder, TL(2) Security, Christian Toon, CISO, Pinsent Masons, and Anna Delaney, editor at teiss, discuss the challenges around culture and legalities when conducting an insider threat investigation.

The conversation was fueled by this article from The Register which highlights breaches in senior integrity.

Copyright Lyonsdown Limited 2021

Top Articles

It’s time to upgrade the supply chain attack rule book

How can infosec professionals critically reassess how they detect and quickly prevent inevitable supply chain attacks?

Driving eCommerce growth across Africa

Fraud prevention company Forter has partnered with payments technology provider Flutterwave to drive eCommerce growth across Africa and beyond.

Over 500,000 Huawei phones found infected with Joker malware

The Joker malware infiltrated over 500,000 Huawei phones via ten apps using which the malware communicates with a command and control server.

Related Articles