There are several courses which teach insider threat program development. While the methods and controls taught are very comprehensive and effective, often-times they can also be bypassed.
Learn how the controls of your current security program can be bypassed by utilizing routine IT procedures. Will also show how to identify business processes which can contribute to insider threats. Learn how to enhance procedures required to identify insider threat exposures.
This program is designed to help organizations identify existing critical controls needed to develop an Insider Threat Program using a white hat hacking methodology.
A series of live demonstrations will be performed to show the white hat hacking techniques used to bypass various controls.
https://events.secureworldexpo.com/agen ... a-ga-2019/
