Insights/Case studies/Newsroom/CareersCareersCareersPartnersConsultantsTechnology innovationCorporateEarly careersSearch Jobs/About us/Contact us Global locations

  • Phone
  • Contact us
  • Locations
  • Search
  • Menu


  • Add this article to your LinkedIn page
  • Add this article to your Twitter feed
  • Email this article
View or print a PDF of this page

"If organisations are to reduce their exposure to the insider threat, they need to have effective protective monitoring capabilities. This need not entail significant technology investment; often the biggest gains are to be drawn from better integration across an organisation's functions."
bill windle, PA cyber security Expert

Tackling the challenges of cyber security: managing people risk and the insider threat – PA leads the debate at IA11

PA Consulting Group’s cyber security experts Ed Savage and Bill Windle recently presented at IA11, the UK Government's leadership event for cyber security and information assurance, run by CESG/GCHQ.

As chairman of the conference stream ‘Managing information risk in a cyber world – the human factor’, Ed spoke about how organisations can identify, recruit and retain the people they need to improve their cyber security and protect business assets.

Bill Windle presented to an audience of over 100 senior public and private sector delegates about how organisations can use strategic protective monitoring to help manage the insider threat from within their organisation as part of an integrated approach to cyber security. Bill drew on PA’s current work with the UK Government’s Centre for Protection of National Infrastructure (CPNI), where PA is helping to develop new national guidance on a holistic approach to managing people, physical and cyber risk in public and private sector organisations. 

Read a summary of Bill's presentation on the insider threat.

To speak to PA's cyber security team, or to find out more about improving your cyber security strategy and protecting your organisation, please contact us now.

By using this website, you accept the use of cookies. For more information on how to manage cookies, please read our privacy policy.