Anti-Phishing, DMARC , Business Email Compromise (BEC) , Email Threat Protection
Ingredients of a Good Insider Risk Program
Former FBI Special Agent on How to Design a Program That Analyzes User BehaviorAny technology that allows you to do a full-person assessment by taking into account nontechnical data as well as technical data is a value-add to an insider risk program, says Peter J. Lapp, former special agent at the FBI.
See Also: Live Webinar | Cutting Through the Hype: What Software Companies Really Need from ASPM
He recommends using "a technology that has analysis of user behavior. The technology needs to look at and identify employees whose risk scores have started to increase and compare them with insider risk areas."
In a video interview with Information Security Media Group, Lapp also discusses:
- How to create an insider risk management strategy;
- What tools and technologies can be leveraged for an insider risk program;
- How to design a meaningful training program.
Lapp is the founder of PJ Lapp Consulting, where he focuses his vast knowledge and experience in the areas of counterintelligence and insider risk. As a retired special agent of the Federal Bureau of Investigation, Lapp is highly experienced in the areas of counterintelligence, espionage, economic espionage, and trade secret theft.