Key Factors to Building a Successful Counter Insider Threat Program

In the digital age, traditional security measures such as facility gates and guards offer little protection for organizations’ most valuable asset: information. Even digital defenses such as firewalls are no match against threats that are unseen, global, and even internal. In fact, those on the inside of the network can often cause the most harm.

Download this whitepaper to:

  • Learn what constitutes an insider threat
  • Read real-life examples of the harm caused by insiders
  • Understand the framework for developing a successful insider threat program
  • Gain practical tips and tricks to help you develop an effective insider threat program for your organization.
Keith Lowry

Keith Lowry

Former Senior Vice President, Nuix USG

Keith has 30 years of experience implementing, managing, and directing insider threat, counterintelligence, and intelligence collection programs. He is a former law enforcement officer and High-Technology Crime Unit detective with the City of San Jose, California and a retired United States Navy Captain.

He also served as Chief of Staff to the Deputy Under Secretary of Defense for Human Intelligence, Counterintelligence and Security at the Pentagon, and as an information security consultant in the private sector.

Read More

Download the White Paper