New Blog Post | Practitioners guide to effectively managing insider risks

%3CLINGO-SUB%20id%3D%22lingo-sub-2220502%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Practitioners%20guide%20to%20effectively%20managing%20insider%20risks%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2220502%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22JasonCohen1892_0-1616084946565.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F265285i0F6EB107704ACBB5%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22JasonCohen1892_0-1616084946565.png%22%20alt%3D%22JasonCohen1892_0-1616084946565.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fpractitioners-guide-to-effectively-managing-insider-risks%2Fba-p%2F2160113%22%20target%3D%22_blank%22%3EPractitioners%20guide%20to%20effectively%20managing%20insider%20risks%20(UNCOVERING%20HIDDEN%20RISKS%20%E2%80%93%20Episode%205)%20(microsoft.com)%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EThe%20following%20conversation%20is%20adapted%20from%20transcripts%20of%20Episode%205%20of%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Funcoveringhiddenrisks%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUncovering%20Hidden%20Risks%3C%2FA%3E%26nbsp%3Bpodcast.%26nbsp%3B%20There%20may%20be%20slight%20edits%20in%20order%20to%20make%20this%20conversation%20easier%20for%20readers%20to%20follow%20along.%26nbsp%3B%20You%20can%20view%20the%20full%20transcripts%20of%20this%20episode%20at%3A%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Funcoveringhiddenrisks%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2Funcoveringhiddenrisks%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EIn%20this%20podcast%20we%20explore%20steps%20to%20take%20to%20set%20up%20and%20run%20an%20insider%20risk%20management%20program.%26nbsp%3B%20We%20talk%20about%20specific%20organizations%20to%20collaborate%20with%2C%20and%20top%20risks%20to%20address%20first.%26nbsp%3B%20We%20hear%20directly%20from%20an%20expert%20with%20three%20decades%20of%20experience%20setting%20up%20impactful%20insider%20risk%20management%20programs%20in%20government%20and%20private%20sector.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2220502%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EInsider%20Risk%20Management%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

JasonCohen1892_0-1616084946565.png

Practitioners guide to effectively managing insider risks (UNCOVERING HIDDEN RISKS – Episode 5) (mic...

The following conversation is adapted from transcripts of Episode 5 of the Uncovering Hidden Risks podcast.  There may be slight edits in order to make this conversation easier for readers to follow along.  You can view the full transcripts of this episode at:  https://aka.ms/uncoveringhiddenrisks

In this podcast we explore steps to take to set up and run an insider risk management program.  We talk about specific organizations to collaborate with, and top risks to address first.  We hear directly from an expert with three decades of experience setting up impactful insider risk management programs in government and private sector.

1 Reply
Thank you for sharing this. this is really important topic.
It would be nice to have more weblog with best practices and practical videos on this topic.
I am aware of such contents in Microsoft Docs but it is an area where need more contents.