Threat and Vulnerability Management

Hunting Insider Threats: Forrester’s Model for Establishing an Insider Threat Team

Provided by Forcepoint

Category Threat and Vulnerability Management

Type White Paper

Length 16

Publish Date October 06 2016

Date posted October 06 2016

Overview

Every organization needs a strong insider threat program. But great technology isn't enough, it is vital to have the right people and processes in place, too. Understanding the risks and what to do about them can help keep a company’s sensitive data secure and this white paper provides a step-by-step guide on how to implement a successful insider threat program.

Blogs

phil-muncaster

China Rising

China’s Cybersecurity Law: Game over for foreign firms?

Phil Muncaster reports on China and beyond

jon-collins

Thinking Different

Today’s tech can’t beat my stupid email response

Jon Collins’ in-depth look at tech and society

mark-chillingworth

CIO Watch

Losing CIOs to startups could be costly

Mark Chillingworth on IT leadership

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Crowdfunding: Viable alternative to VC funding or glorified marketing?