Blueprint: Build the Best in Cyber Defense cover image

James Rowley: Creating and Running an Insider Threat Program

Blueprint: Build the Best in Cyber Defense

00:00

Detection of Threats

You need to feed at data, lek, intentional data that you know, what's going on within the data. You can't just throw all the data sources in there and then see what it tells meou right? Ye. Like, what are te actual actions people are doing in that sort of scenario? Ye. So if it's not doing that, those are one of the things you want to do right away, like o get it back to that kind of a, you know, a single view that is dedrives the picture for your story. That's definitely one of the first things.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app