Having visibility into what potential insider threats in your organization (along with third-party vendors/contractors) are doing with your systems, files, and data is important to detecting risky activity or incidents. But knowing how to respond to insider threats once they have been detected is just as crucial.
In How to Respond to Insider Threat Incidents: A Simulation, we will simulate an example insider threat incident and demonstrate what a successful response could look like.
In this guide, you’ll learn about:
- What an insider threat incident can look like
- Know who should (and shouldn’t be) involved in an investigation
- See what information is most useful for determining intent and response
- How to communicate with parties, once an incident has been detected
Thank you for your interest!