Security

The Trusted Insider Threat - Lessons Learned From WikiLeaks

Watch Now Free registration required

Executive Summary

In this webcast, the presenters say about protecting against and detecting potential data leakage is at the heart of the WikiLeaks controversy. However there is no "One size fits all" solution. It must be addressed at multiple levels with collaborating technologies, including SIEM, database monitoring and application monitoring, to provide the most complete prevention and detection strategy possible.

  • Format: Webcast
  • Size: 0 KB