congratulations. You're building an insider threat program. But before you go off hiring analysts and evaluating tools, there are some key things you need to consider.
In the days of your data, thefts were pretty low tech.
A thief grabbed a crowbar, broke into a building and walked away with company secrets. Clad in Manila folders
in the Information Age. The approach changed to hackers using server exploits and sequel injections.
But the result was the same
outsiders breaking in and taking stuff.
Traditional cybersecurity programs have focused on preventing malicious actors from breaching our digital perimeter and robbing our intellectual property.
But if you've been following the headlines and listening to the experts lately, you know that insider threats to data is kind of a big topic
in this course will look at what insiders air doing that puts data at risk
the changes to the digital landscape that have opened up a whole bunch of ex filtration vectors and other external factors that inform how you build your program, including who needs a seat at the table when you do
the better you understand the why and the what more manageable the how will be