The Five Stages of Insider Threat

Much has been made of the insider threat faced by organisations this year and many vendors are hooked on the message of fixing the problem with technologies but the issue requires a lot more thought than that.

There are clear definable points within the insider threat lifecycle. How you work with your staff on a day to day basis, the communication of troublesome news, enabling staff to be able to perform their roles. In this webinar, we will look at the five stages of the insider threat, what makes a person do it and what you as a business can do to spot the signs and prevent an incident from occurring.

Key takeaways:

  • How to focus on controls rather than personnel management
  • Identifying the threat, and what drives that person to commit the actions
  • Where the opportunities are commonly presented
  • Typical attack tactics and common targets


Photo of Jay Abbott

Jay Abbott

Managing Director, Falanx Cyber Defence

Photo of Chris Payne

Chris Payne

Managing Director, Advanced Cyber Solutions

Photo of Sam Temple

Sam Temple

Managing Director, JUMPSEC

Brought to you by

What’s hot on Infosecurity Magazine?