Best Practices for Implementing an Insider Threat Program
VP, COO at Gurucul
Craig Cooper has served in several information security and risk management roles including CISO for a Fortune 500 Financial Services organization. While in this role, Craig defined and implemented an ISO standards-based Information Security program. Craig has led, developed, and delivered multiple Identity and Access Management Strategies and Roadmaps for several organizations. Craig has written for several trade magazines and has been a speaker with Burton Catalyst, Gartner, and ISSA.
Other webinars of this speaker:
Analytics-Driven SIEMThe Three Pillars of Behavior3rd Party RiskDiscover & Manage Access RisksDetecting Malicious Traffic Best Practices for an Insider Threat Program The Enemy WithinRisk Based Authentication Program Zero Trust PossibleSecuring Data with a Remote Workforce