Close

Tackling Insider Threats Before They Strike

(7D)

Stream: Virtual Room 7
Time: 13:45 - 14:30


Presentation

Description

Who are your insider threats, and how are they getting in? Insider threats pose significant risks to organizational security and are often difficult to detect. They can range from accidental policy violations to deliberate system exploits, causing serious harm. This session explores the nature of insider threats, the vulnerabilities that enable them, and strategies to detect and mitigate these risks. Gain actionable insights to protect sensitive data and stay compliant with evolving access and authentication regulations.
We will explore:
• Proactive measures to reduce the insider risk to the organization
• Coverage of potential system-level vulnerabilities
• How recent regulatory updates, like DORA, are influencing organizational security policies

Attachments

There is currently no attachment for Tackling Insider Threats Before They Strike

Speakers


  • Johnathan Crossno at Rocket Software UK Ltd
  • John Crossno Rocket Software, Director of Product Management John is a Director of Product Management at Rocket Software. John spent the early part of his 40+ year mainframe career writing communications systems software for and between mainframe and non-mainframe systems and has subsequently enjoyed multiple Product Development and Product Management roles for various IBM Business Partners and mainframe ISVs in fault diagnosis, storage, and security disciplines. John is responsible for Rocket's mainframe Security and Storage portfolios as well as some integrations and relationship management.


    Email: jcrossno@rocketsoftware.com

    Feedback

    Click here to give some Feedback so we can make it even better next year!