What sort of strategies are you using to reduce insider risk among IT workers specifically?
1.7k views2 Comments
Sort By:
Oldest
Please join or sign in to view more content.
By joining the Peer Community, you'll get:
- Peer Discussions and Polls
- One-Minute Insights
- Connect with like-minded individuals
Director of Information Securitya month ago
The organization I work for implemented MFA, a service e-mail gateway and a "next-gen" vulnerability management scanner all within 12 months.Content you might like
What’s on your IAM roadmap for the next 18-24 months?
Director of IT in IT Services4 days ago
Implementation of Zero trust architecture, its modules across the organisation is a priority for us. So, we will be implementing zero trust strategies in IAM, inline with overall strategy.1.4k views1 Comment
Human Factors (fears, mental health, physical spacing)85%
Technical / IT Factors (on-premise tools, pivoting back away from remote)14%
CISO/CPO & Adjunct Law Professor in Finance (non-banking)a month ago
1. Ensure the “different” providers are not front ends for the same foundational provider.2. Review the track record of each provider on the whole as well as their record with organizations of your size, ...read more
1
506 views3 Comments
What is your organization’s current status for implementing endpoint security to protect O365 on mobile devices?
Implementation complete23%
Implementation in progress54%
Planned within the next 12 months12%
Not planned7%
Not enabling O365 on mobile2%
2.4k views2 Upvotes
2. Monitoring and Auditing
3. Employee Training and Awareness
4. Behavioral Analytics
5. Data Loss Prevention (DLP)
6. Employee Onboarding and Offboarding Procedures
7. Encourage a Positive Work Environment