1 hour 25 minutes
of participating in the group. Okay. Your it wig?
Yeah. It is still
the insider threat Working group. The it twig fun acronym. No need to thank me. You're welcome. Is a group.
Is the group from an insider incident? Think about
I thought to love. So be sure they're comfortable with the time commitments of participating in the group. Okay, Your
you don't want to have your goals undermined by too many competing priorities.
I am supposed to say this one
to get executive buy in. You'll have to be.
I was gonna say it week. Having an insider incident
inside are good or lower. The clearly shows the risks from
sure. This user could also use some more training about proper to
by promoting their project in the reports in their reports, by promoting their project in their reports. So to get insect's etten,
And for that, you'll need an executive risk assessment.
To be clear, this isn't a risk assessment of
I'm going to stop talking,
but let's hear from pewter ho slaughtered his name before I started.
Sorry, Peter, Once the investigation has begun, evidence should be collected and retained. But are you using a sim or sore tool, for instance. What? Monitoring or auditory auditory auditing? Can you hear the data being expatriated?
Think about the security objectives and programs in your organization
with two for the realities of the collaborative Fort whole. Who's got past the
I think I was supposed to say that last part,