
- This event has passed so registration is closed.
Overview
Insider threats continue to be a significant cybersecurity threat within organizations, although often overlooked. In fact, in the past two years, insider threat incidents increased by 44%, and the annual cost of those threats increased from $11.45 million to $15.38 million. Insider threat risks are clearly an area that organizations need to address.
Join our webinar to learn about the benefits of a modern, people-centric approach to insider threats and data loss. Hear insights from the Ponemon 2022 Cost of Insider Threats Report and understand what the data means for your organization.
You will learn:
• How to recognize the three insider threat profiles and why they are trending up
• The importance of context to understand people risk
• Real-world examples of insider threat scenarios and their implications
• How to build an ITM program tailored to business outcomes
Moderator
Alex Grohmann – Founder, Sicher Consulting
As a security and privacy professional for over 25 years, Alex Grohmann as helped to promote the profession through professional and personal contributions. He is currently the Chief Information Security Officer (CISO) for Acuity International, a $550 million organization with locations in over 10 countries. He volunteers a great deal of his time to make the profession stronger through his efforts in ISSA.
During Alex’s time on the international board, has been the lead for the Privacy Special Interest Group (SIG), managing the group and the efforts along with the chairs. The SIG has grown to nearly 2,000 members in the few short years of its existence.
As a 20-year member of the Northern Virginia chapter, Mr. Grohmann has volunteered on its board for 9 years, with 3 of those as chapter president. During that time, the chapter won the Chapter of Year, and he collected the Honor Roll and Fellow designations.
Outside of ISSA, Alex has served on several boards and/groups including Washington DC InfraGard, NIST’s NICE and the IT-Sector Coordinating Council (IT-SCC).
Alex is a graduate of Florida State University in Management Information Systems, and a proud Seminole.
Speaker/s
Stephanie Torto – Senior Product Marketing Manager, Proofpoint
Stephanie is a Senior Product Marketing Manager at Proofpoint, where she is responsible for the messaging and positioning of its Insider Threat Management and Endpoint Data Loss Prevention solutions. Before joining Proofpoint, Stephanie held a variety of roles spanning product marketing, client research, and market strategy at IBM. Prior to IBM, Stephanie spent several years as an industry analyst at IDC, providing insights and advice on market trends and industry dynamics to executives at leading technology and IT services firms. Stephanie holds a BA degree from Union College and an MBA from Babson College.
See Stephanie Torto‘s full profile.
Brian Reed – Sr. Director, Cybersecurity Strategy, Proofpoint
Brian Reed is a Cybersecurity Evangelist for Insider Threat at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics – cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP.
Previous to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.
Recent On-Demand Web Conferences
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.