The Inside Line on Information Protection: From Malicious to Careless: How to Investigate Insider Threats
Protecting People - En podcast af Proofpoint
How is an insider threat incident response like a murder investigation?You start with motive, then leverage investigative tools and knowledge of people to unearth a trail of mistakes. (Yes, it’s actually quite exciting!)In this episode, series host Sai Chavali speaks with fellow Protecting People host Brian Reed, Cybersecurity Evangelist at Proofpoint, about insider threat cases and what makes a successful incident response.Join us as we discuss:The three buckets of insider threatsSpecific insider threat cases every investigator should studyAsking “who, what, why, and when” to protect against insider threatsHow incident response can be like a murder investigationCheck out these resources we mentioned:Report mentioned at [5:47]2020 Cost of Insider Threats: Global Report Proofpoint blog post mentioned at [8:19]The Top 10 Biggest and Boldest Insider Threat Incidents, 2020-2021 For more episodes like this one, subscribe to us on Apple Podcasts, Spotify, and the Proofpoint website, or just search for Protecting People in your favorite podcast player.