Copyright 2019 Jazz Networks

Your security webinar

Introduction to build an insider threat program

Dive deep into effective insider threat programs with Chris Denbigh-White and Neena George, Security Professionals at Jazz Networks

About the webinar

Insiders threats are categorized into accidental, negligent, malicious, and financial-seeking. The main differentiator is whether they are unintentional or intentional. This definition covers seemingly endless scenarios.

How do you create an insider threat program that covers such a wide array of actions?

You'll learn

Why you need an insider threat program.
What resources you need to build an insider threat program.  

Who needs to be a part of your cross-functional team.
How you build an insider threat program from scratch. 





Chris Denbigh-White, MBCS GCIH GPEN GNFA CISSP, is a former police and intelligence officer. He has worked in system design and defense for both the public and private sectors. He contributes to the advisory board of the SANS Institute and assists in certification question writing for the ISC2 CISSP exam. Chris currently works with Jazz Analytical Services as a Security Analyst helping clients protect what really matters.


Chris Denbigh-White, Security Analyst

On-demand webinar
Recorded: Tuesday, November 26th, 2019
Duration: 1 hour
Register to see the recording now.

Speaker #2

Neena George, Product Manager

Neena George is a cybersecurity industry professional who is well versed in assessing and building products to meet the ever-evolving threat and technology landscape. Experienced with both network and endpoint security products, she currently enjoys her role as a Systems Engineer and Product Manager at Jazz Networks, where she gets to be at the front line of understanding customer cybersecurity challenges and helping to solve them. Neena holds an M.S in Electrical Engineering from the University of Cincinnati, OH. 

About Jazz Networks

The only Insider Threat Detection & Response on the market – protecting what really matters. 

National Insider Threat Task Force (NITTF) approved UAM solution. CNSSD 504 certified. 

Winner of US Cyber Command's insider threat competition: RPE-003: The Wolf in Sheep's Clothing