Video

Preventing Insider Crimes

Tim Ryan, Managing Director, Kroll Advisory Solutions
Preventing Insider Crimes

The big, external breaches get the headlines, but the insider crimes are doing significant financial damage, says Tim Ryan of Kroll Advisory Solutions. How can organizations address the insider threat?

See Also: Are Security Tools Slowing Your Response?

To start, security leaders need to understand which are the most potent insider threats - and why many of today's common detection solutions are ineffective.

In a video interview on insider threats, Ryan discusses:

  • Today's top threats;
  • Lessons learned from recent incidents;
  • How organizations can best mitigate threats.

Ryan is a Managing Director with Kroll Advisory Solutions' Cyber Investigations practice based in New York. He joined Kroll after a distinguished career as a Supervisory Special Agent with the Federal Bureau of Investigation (FBI), where he supervised the largest Cyber Squad in the United States. An expert in responding to all forms of computer crime, attacks and abuse, he has led complex cyber investigations involving corporate espionage, advanced computer intrusions, denial of service, insider attacks, malware outbreaks, Internet fraud and theft of trade secrets.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.