March 4
4:00 PM

St. Regis San Francisco

125 3rd Street
San Francisco, CA

Join global security and business experts at the premiere Insider Threat knowledge-sharing event of the year!

This year saw not only continued growth of insiders as a threat vector, but also a massive leap in public awareness and discussion around privacy. The overlap of these two critically important topics mean that organizations are forced to achieve a very delicate balance: how it is possible to protect against insider threat while also fostering an environment of trust — one that enables employees and the business as a whole?

At the 2019 Global Insider Threat Summit, cybersecurity and business experts will gather to discuss how they are answering that question and fighting insider threats while building a culture that treats everyone as a trusted insider.

Join us the week of RSA for an inside look at timely topics like:

  • How leading organizations, including top 10 financial institutions, are using User Behavior Intelligence to protect their data while managing the adoption of innovative technology.

  • How security leaders are rising to new standards of employee privacy protection in the face of increased regulation, without jeopardizing security or productivity.

  • How business leaders approach security as a business enabler, utilizing user behavior insights to further business goals in addition to security goals.

  • How practitioners utilize evolving technology, such as machine learning, to build an insider threat approach that is just as intelligent and agile as the people and data it protects.

The event will consist of a panel, a fireside chat, and networking, with specific speakers and agenda to be announced. 


Hosted by Dtex

Dtex Systems arms enterprises across the globe with revolutionary technology to protect against user threats, data breaches, and outsider infiltration. As the only solution combining unparalleled endpoint visibility with advanced analytics, Dtex is able to pinpoint threats with greater accuracy than traditional security methods without adversely impacting user productivity.