Stream: Virtual Room 7
Time: 13:45 - 14:30
Who are your insider threats, and how are they getting in? Insider threats pose significant risks to organizational security and are often difficult to detect. They can range from accidental policy violations to deliberate system exploits, causing serious harm. This session explores the nature of insider threats, the vulnerabilities that enable them, and strategies to detect and mitigate these risks. Gain actionable insights to protect sensitive data and stay compliant with evolving access and authentication regulations.
We will explore:
• Proactive measures to reduce the insider risk to the organization
• Coverage of potential system-level vulnerabilities
• How recent regulatory updates, like DORA, are influencing organizational security policies
There is currently no attachment for Tackling Insider Threats Before They Strike
John Crossno Rocket Software, Director of Product Management John is a Director of Product Management at Rocket Software. John spent the early part of his 40+ year mainframe career writing communications systems software for and between mainframe and non-mainframe systems and has subsequently enjoyed multiple Product Development and Product Management roles for various IBM Business Partners and mainframe ISVs in fault diagnosis, storage, and security disciplines. John is responsible for Rocket's mainframe Security and Storage portfolios as well as some integrations and relationship management.
Click here to give some Feedback so we can make it even better next year!