Insider Threat: A Guide to Detecting the Enemy Within

Proofpoint's Andrew Rose on the Evolving Threat Landscape

As the workplace quickly evolves, people are working from everywhere and accessing data from anywhere. Suddenly, CISOs must manage not just external threats but countless risks from within, which always prove more elusive and harder to detect or prevent than traditional external ones. While the most common insider threats are unintentional and not usually motivated by malicious intent, they are no less damaging to business viability.

In this video interview with Anna Delaney of Information Security Media Group, Proofpoint's Andrew Rose discusses:

  • The evolving landscape of insider threats and the complexities of the challenges they present;
  • Strategies to monitor employee behavior without encroaching on privacy;
  • Best practices to detect and mitigate insider risk.

Rose is resident CISO for the EMEA region at Proofpoint. His focus is driving Proofpoint's people-centric security vision, strategy and initiatives among the company's customer base, bringing hands-on experience, knowledge and perspective in managing risk and improving cybersecurity posture across complex enterprises. Rose was previously chief security officer of Mastercard subsidiary Vocalink, which is responsible for much of the U.K.'s instant and bulk payments, covering over 90% of U.K. salaries, over 70% of U.K. bill payments and nearly all U.K. benefit payments.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.