Security

Insider Threats, Privileged User Abuse and Mitigation Techniques

Download Now Free registration required

Executive Summary

In this podcast, the speaker discusses about insider threats. The speaker explores the differences between careless and nefarious insiders and talks about the difficulties of managing risks surrounding privileged users. The speaker also discusses several threat mitigation strategies.

  • Format: PDF
  • Size: 0.19 KB