Secure a spot at Insider Threats

If you are interested in attending contact our Audience Development Team!

Insider Threats 2020 Online Event


According to Verizon’s 2019 Insider Threats report, 56% percent of breaches takes months or longer to discover, and the Ponemon Institute calculated that the average cost of insider threats globally over the last 12 months is $8.76 Million. This makes it crucial to ensure that organization are working diligently to internally protect sensitive data, monitor their employee activity, to include maintaining threat intelligence and detection of the highest level. The goal of this year’s summit will be to gain insight on how industry leaders are protecting their data and organization from insider threats with relevant technological solutions, new age policy development, and the efforts to conduct proper vetting and screening of potential threats.

Join us at Insider Threats 2020 Online as we narrow down proven and effective resources and tools to prevent insider threats. Our esteemed speakers will be made up of both Government and commercial industry leaders tackling the wide spread issue. Gain knowledge and network as we find ways to uncover your next unforeseen insider threat. Protect your company.

2020 Speakers

Interested In Becoming A Valued Sponsor?

Our agenda is packed solid with opportunities to get in front of the right people in the format that best suits you. Our sponsorship opportunities take many avatars including involvement in thought leadership sessions, demo drives and exhibitor spaces. Work collaboratively with our team on a tailor-made package. We will answer any questions you have and help you decide if this event is right for you!

Main Themes Include:

globe image

Discover proven, effective resources and tools to identify the next unforeseen insider threat.

iphone image

Network with industry and government officials leading the charge against insider threats to protect their workplace.

iphone image

Mitigate malicious, negligent or infiltrator threats and recognize the need to create a successful insider threats program.

iphone image

Walk away with relevant tech solutions, policy development and proper vetting and screening techniques to stop potential insider threats.