When it comes to figuring out insider risk indicators within the company, there are a few things you need to ask yourself. First, what classifies as an insider threat indicator, and what does it look like? What are potential and early insider risk indicators?
This workshop explores the risk of unauthorized data usage and exfiltration performed by insiders and how Code42 can help decrease time to detection and speed up the investigation of security events.
For example an “insider” can be defined as a person belonging to a particular group or organization. There is a good chance they have legitimate access to secure data, putting them into an ideal position to threaten the security of that data. Whether they have the intention or not, they are in a position to do so.
This session is beneficial for anyone responsible for Code42 enterprise deployment and approaches Code42’s software offering from the end-user and administrator perspectives.
Code42 uses roles as the basis for visibility and capability within the endpoint application and console.
Users with Help Desk, Legal, Security, and/or Organization administration roles can enroll in the Instructor Led Courses below to receive training of their specific role(s) within their Code42 environment.