Cyber threats arise from numerous sources, including state actors, terrorist groups, criminals, hackers, business competitors, and even trusted insiders. In fact, it’s the threat from trusted insiders that may pose the most significant threats. Whether as a malicious act —the deliberate exfiltration of information or introduction of malware or other harmful code —or inadvertent actions by careless employees, the greatest threat to an organization's information system is often on the inside.
On May 25, NCSC Insider Threat Directorate (ITD) teams up with the Cyber Security Summit to examine the role of insider threat mitigation in cybersecurity. During this hour-long webinar, we’ll discuss the current risk environment, including heightened vulnerabilities created by the Global Pandemic; identify potential threats posed by trusted insiders and the adversaries who seek to co-opt or exploit them; and share best practices and resources available to mitigate the risk.
Deputy Assistant Director, Insider Threat
Deputy Director, National Insider Threat Task Force
National Counterintelligence and Security Center
George C. Marshall European Center for Security Studies