Completed
Insider threat definition
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Building a Successful Insider Threat Program
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Daniels background
- 3 User activity monitoring
- 4 Insider threat definition
- 5 Why arent we auditing
- 6 We should be auditing
- 7 Look real
- 8 What makes a complete Insider Threat Program
- 9 Hope is not a strategy
- 10 The Y document
- 11 The staff
- 12 Stakeholders
- 13 Malicious Insider
- 14 Technical observables
- 15 Governance and oversight
- 16 Documentation
- 17 Tool Selection
- 18 Implementation Plan
- 19 Questions