Best Practices and Controls for Mitigating Insider Threats

Threats can stem from simple activities like uploading, emailing, and posting sensitive data, etc. In this webcast, the presenter will explain about best practices and controls for mitigating insider threats from the virtual event of how to manage the insider threat.

Provided by: Carnegie Mellon University Topic: Security Date Added: Nov 2013 Format: Webcast

Find By Topic