Personal Info

Sign Up:

(*) denotes required form field(s)

Our registration process uses cookies, by submitting this registration form you agree to our cookie policy.


Building an Insider Threat Program for your Organization


On Demand




Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization. According to the US Department of Homeland Security 46 percent of the most expensive cybercrimes were a result of an insider threat and almost 34 percent of insider threat cases were targeted towards collecting personally identifiable information (PII). Having controls in place to prevent, detect, and mitigate insider threat surge and accidental data leaks is a necessity for any organization that intends to protect its business-critical data.


Yet, Gartner states that only less than 20 percent of the organizations have an insider threat program today. While it is expected to grow to 60 percent by 2023, organizations must prepare for a functional insider threat program as a core part of their holistic cybersecurity strategy. Building a proper insider threat program requires multiple technologies including endpoint detection and response (EDR), data loss prevention (DLP),and in-depth analysis of user behavior (UBA).


Key takeaways include:


- Identifying the indicators that reveal malicious insiders and understanding common use cases that happen every second at work

- Insider threat detection capabilities with User Behavior Analytics (UBA) insights added to SIEM

- Best practices for building and maintaining an effective insider threat program through comprehensive visibility, real time intelligence and policy enforcement




This webinar is run by GRC World Forums Ltd (GRC), in association with the sponsor, ManageEngine (“the Sponsor”), who are joint controllers of your data for the purposes of the Data Protection Act 2018. The registration process is handled by WorkCast as data processor. Your registration details are requested so that the webinar can be delivered to you and for marketing and analytical purposes. GRC and the Sponsor aim to provide free and fair access to the best industry content and in return for providing this content free of charge, GRC and the Sponsor would like to contact you about products and services that you may find interesting. 

By registering for the webinar, you confirm that the personal details given are correct and you consent to receiving marketing communications from GRC and the Sponsor. You will be able to unsubscribe at any time by following the links in any marketing emails sent to you. Alternatively, you may at any time withdraw your consent to receiving future communications from GRC and/or the Sponsor by sending a notification to Your information will not be passed on to any third parties.

View GRC'S Privacy Policy

View ManageEngine's Privacy Policy


Jay Reddy
Sr. Technical Evangelist
View Biography
Robert Papp
Head of Compliance
View Biography
Suresh Nair
Chief Information Security Officer
General Electric
View Biography