All Events and Webinars

Detecting and Mitigating Insider Threats Webinar

Cross Industry
June 30, 2023
Insider threats are rarely malicious, but they remain one of the most consistent causes of data loss. This session explores how organisations can detect and reduce risk by focusing on data, behaviour, and real-world workflows rather than rigid controls. Viewers will learn how to combine culture, visibility, and AI-driven detection to manage insider risk without disrupting the business.

In-House Specialists

Ronan Murphy

Founder and Executive Chairman
View speaker profile

Featured Guest Speakers

Richard Pace

Senior Director

Jan Tietze

Field CTO

Mark Brosnan

Managing Director

Key Strategic Takeaways

Insider Threat Is Mostly Unintentional, Not Malicious
Supply Chain Access Expands the Insider Attack Surface
Data-First Security Enables Practical Prioritisation
AI Enables Context-Aware Detection Without Breaking Workflows
Culture, Clarity, and Detection Speed Define Success
  • 00:08 Introduction: Insider threat landscape and key speakers
  • 01:18 Insider threat types: malicious vs unintentional (UIT)
  • 02:29 Real-world cases: Waymo IP theft and Boeing espionage
  • 04:13 Insider threat reality: accidental users vs sophisticated attacks
  • 05:31 Supply chain attacks as “imported insiders” (SolarWinds, MOVEit)
  • 06:29 Limits of detecting state-sponsored insiders
  • 10:00 Data-centric security and risk-based prioritisation (CMMC context)
  • 13:30 AI solving data classification at scale (vs legacy DLP)
  • 16:04 MOVEit and why prevention alone fails (shift to behaviour detection)
  • 20:17 Behaviour-based detection vs traditional network monitoring
  • 22:19 Human behaviour, culture, and policy gaps as root cause
  • 30:22 Misalignment: GRC vs security vs business reality
  • 37:01 Culture change through behavioural training and simulation
  • 40:05 Building insider threat programmes without massive resources
  • 46:34 AI risks: data leakage via LLMs and misuse
  • 49:51 Protecting IP (e.g. code) with AI-driven classification
  • 55:00 LLMs vs narrow AI models for security use cases
Watch More
No items found.

Ready to scale your security and compliance operations?

We protect your on-premise/cloud/OT environments - 24x7x365