According to a recent survey* of 479 leading companies, insiders were to blame for nearly half of all data compromises. And in almost half of these breaches, the insiders mounted deliberate assaults.
Join security experts John Vajda, Martin Irwin and Ben Rogers for an enlightening discussion about the nature of—and defenses against—insider-triggered breaches.
View the Insider Risk: Education and Best Practice Webinar today to find out:
Effective key management is a critical component of insider-threat and insider-risk protection. View this informative webinar now to learn more about how you can protect yourself against both careless and malicious insiders.
* “Your Data Protection Strategy Will Fail Without Strong Identity Context,” June 27, 2011, by Andras Cser, Senior Analyst, Forrester Research