Building a Successful Insider Threat Program

Building a Successful Insider Threat Program

via YouTube Direct link

The Y document

10 of 19

10 of 19

The Y document

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Building a Successful Insider Threat Program

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Daniels background
  3. 3 User activity monitoring
  4. 4 Insider threat definition
  5. 5 Why arent we auditing
  6. 6 We should be auditing
  7. 7 Look real
  8. 8 What makes a complete Insider Threat Program
  9. 9 Hope is not a strategy
  10. 10 The Y document
  11. 11 The staff
  12. 12 Stakeholders
  13. 13 Malicious Insider
  14. 14 Technical observables
  15. 15 Governance and oversight
  16. 16 Documentation
  17. 17 Tool Selection
  18. 18 Implementation Plan
  19. 19 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.