Who Watches the Watchers...
IP Protection for Privileged Users
Protecting the confidentiality of information is a critical security task. While it is relatively easy to defend against those insiders who should not be accessing certain IP, it is often the employees that create the IP who are most likely to steal it.
In this session, Forcepoint Chief Scientist, Dr Richard Ford, looks at analytic techniques that are effective at protecting information from those who already have legitimate access to it. Richard discusses:
- The need for a human-centric approach to tackle the malicious insider
- What do you do when the creator of the IP… is the thief?
- Behavioural red flags to look out for
- Tips for deploying an Insider Threat Program
Presenter: Richard Ford, Chief Scientist, Forcepoint