697 Tackling Insider Threats Before They Strike
Project and Program:
Security and Compliance
Tags:
Proceedings,
2025,
SHARE Cleveland 2025
Who are your insider threats, and how are they getting in? Insider threats pose
significant risks to organizational security and are often difficult to detect.
They can range from accidental policy violations to deliberate system exploits,
causing serious harm. This session explores the nature of insider threats, the
vulnerabilities that enable them, and strategies to detect and mitigate these
risks. Gain actionable insights to protect sensitive data and stay compliant
with evolving access and authentication regulations. We will explore: -
Proactive measures to reduce the insider risk to the organization - Coverage of
potential system-level vulnerabilities - How recent regulatory updates, like
DORA, are influencing organizational security policies
Back to Proceedings File Library