Go back

Risky Biz Podcast: Building an Insider Threat Program with Coinbase' Courtney Healey and Material's Matt Muller

Senior Manager of Insider Threat at Coinbase, Courtney Healey, joins Material's Matt Muller on the Risky Biz podcast (starts at 43:37). They chat with host Patrick Gray on the importance of building a diverse and multi-disciplinary insider threat team and key steps to building a strong insider threat program.

Industry Insights
June 26, 2023
m read
m read
m listen
m watch
m watch
two headshots of two people in a green background
speakers
speakers
speakers
authors
Patrick Gray
Patrick Gray
Material Team
participants
Patrick Gray
Patrick Gray
Patrick Gray
Matt Muller
Matt Muller
Courtney Healey
Courtney Healey
share

Senior Manager of Insider Threat at Coinbase, Courtney Healey, joins Material's Matt Muller on the Risky Biz podcast (starts at 43:37). They chat with host Patrick Gray on the importance of building a diverse and multi-disciplinary insider threat team and key steps to building a strong insider threat program.

Listen now on the Risky Business website—also available on Apple Podcasts, Google Podcasts, and Spotify.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

The Legacy OAuth Detection Model Doesn't Survive AI Agents

Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.

Abhishek Agrawal
8
m read
Read post
Podcast

The Legacy OAuth Detection Model Doesn't Survive AI Agents

Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.

8
m listen
Listen to episode
Video

The Legacy OAuth Detection Model Doesn't Survive AI Agents

Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.

8
m watch
Watch video
Downloads

The Legacy OAuth Detection Model Doesn't Survive AI Agents

Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.

8
m listen
Watch video
Webinar

The Legacy OAuth Detection Model Doesn't Survive AI Agents

Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.

8
m listen
Listen episode
blog post

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

Material Team
10
m read
Read post
Podcast

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

10
m listen
Listen to episode
Video

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

10
m watch
Watch video
Downloads

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

10
m listen
Watch video
Webinar

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

10
m listen
Listen episode
blog post

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

Kate Hutchinson
4
m read
Read post
Podcast

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m listen
Listen to episode
Video

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m watch
Watch video
Downloads

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m listen
Watch video
Webinar

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m listen
Listen episode
blog post

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

Rajan Kapoor, VP, Security
10
m read
Read post
Podcast

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Listen to episode
Video

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m watch
Watch video
Downloads

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Watch video
Webinar

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New