Blueprint: Build the Best in Cyber Defense cover image

James Rowley: Creating and Running an Insider Threat Program

Blueprint: Build the Best in Cyber Defense

00:00

Is There an Insider Threat?

i've heard everything from an employee with actual malicious intent, to it's someone who has insider access, but maybe a hacker's controlling their account. You know, when youare looking for insiders, i think i kind of bucket them into four categories. In doing that, it kind of helps you understand the people processes in technologies that you can ke, actually use to build out use cases.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app