Blueprint: Build the Best in Cyber Defense cover image

James Rowley: Creating and Running an Insider Threat Program

Blueprint: Build the Best in Cyber Defense

00:00

Is John Not an Attacker?

Yel: There's a thir's kind of two pieces of that, where i thought you were going with that answer. Then we're also talking, is this number john i sois counted two pieces in the puzzle, right? Yel: How do we get back to that first piece becase i thinkyo covered the second part really well.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app