Insider Threats, Privileged User Abuse and Mitigation Techniques

Download Now Date Added: Jan 2012
Format: PDF

In this podcast, the speaker discusses about insider threats. The speaker explores the differences between careless and nefarious insiders and talks about the difficulties of managing risks surrounding privileged users. The speaker also discusses several threat mitigation strategies.