Scroll Top
Home » Resources » Webinars » Best Practices for Implementing an Insider Threat Program

Best Practices for Implementing an Insider Threat Program

SPEAKER:
Craig Cooper Risk Response and Security Analytics

Craig Cooper

VP, COO at Gurucul

Craig Cooper has served in several information security and risk management roles including CISO for a Fortune 500 Financial Services organization. While in this role, Craig defined and implemented an ISO standards-based Information Security program. Craig has led, developed, and delivered multiple Identity and Access Management Strategies and Roadmaps for several organizations. Craig has written for several trade magazines and has been a speaker with Burton Catalyst, Gartner, and ISSA.

Share this page: