Time
12 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:07
congratulations. You're building an insider threat program. But before you go off hiring analysts and evaluating tools, there are some key things you need to consider.
00:18
In the days of your data, thefts were pretty low tech.
00:22
A thief grabbed a crowbar, broke into a building and walked away with company secrets. Clad in Manila folders
00:29
in the Information Age. The approach changed to hackers using server exploits and sequel injections.
00:37
But the result was the same
00:39
outsiders breaking in and taking stuff.
00:44
Traditional cybersecurity programs have focused on preventing malicious actors from breaching our digital perimeter and robbing our intellectual property.
00:53
But if you've been following the headlines and listening to the experts lately, you know that insider threats to data is kind of a big topic
01:00
in this course will look at what insiders air doing that puts data at risk
01:06
the changes to the digital landscape that have opened up a whole bunch of ex filtration vectors and other external factors that inform how you build your program, including who needs a seat at the table when you do
01:19
the better you understand the why and the what more manageable the how will be

Up Next

Building a Modern Insider Threat Program

In this course brought to you by industry leader Code42, you will learn their respective frameworks on how to construct an effective enterprise insider threat program to protect your company from the inside out.

Instructed By

Instructor Profile Image
Alex Matheson
Instructor