How Companies Should be Addressing Insider Cyber Threats
Created on August 29, 2017
As companies have poured resources into their network defenses against distant hackers, they often neglect the equal threat posed by those within their network walls—employees who already have privileged access to proprietary systems and whose activity often goes undetected by security systems designed to identify outside attackers. The insider threat not only requires a different security posture, but also raises a host of unique issues when it comes to incident response.
This panel, including attorneys William Ridgeway and Doug Nemec, will walk through an incident response scenario and discuss best practices for mitigating damage and reducing legal exposure from an insider attack.
- Prepare for and protect against insiders
- Identify ethical considerations before, during and after an insider breach
- Establish best practices for conducting an investigation
- Recognize post-breach responsibilities for disclosure, including an overview of enforcement considerations
- Manage expectations of what might happen during litigation
Gain access to this course, plus unlimited access to 1,500+ courses, with an Unlimited Subscription.Explore Lawline Subscriptions