Course Introduction

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
12 minutes
Difficulty
Beginner
CEU/CPE
1
Video Transcription
00:07
congratulations. You're building an insider threat program. But before you go off hiring analysts and evaluating tools, there are some key things you need to consider.
00:18
In the days of your data, thefts were pretty low tech.
00:22
A thief grabbed a crowbar, broke into a building and walked away with company secrets. Clad in Manila folders
00:29
in the Information Age. The approach changed to hackers using server exploits and sequel injections.
00:37
But the result was the same
00:39
outsiders breaking in and taking stuff.
00:44
Traditional cybersecurity programs have focused on preventing malicious actors from breaching our digital perimeter and robbing our intellectual property.
00:53
But if you've been following the headlines and listening to the experts lately, you know that insider threats to data is kind of a big topic
01:00
in this course will look at what insiders air doing that puts data at risk
01:06
the changes to the digital landscape that have opened up a whole bunch of ex filtration vectors and other external factors that inform how you build your program, including who needs a seat at the table when you do
01:19
the better you understand the why and the what more manageable the how will be
Up Next