Blueprint: Build the Best in Cyber Defense cover image

James Rowley: Creating and Running an Insider Threat Program

Blueprint: Build the Best in Cyber Defense

00:00

What Are the Tools and Technologies That Work Best for Insider Threats?

The accident, the negligent and the malicious group are all like people whom you would consider employees. The idea is that you assume that they're an employee until you know that they're not employe. Goc: If we're dealing with something that appears to be a internal kind of employ a sort of attack at least initially, what are the tools and technologies that allin best to those kind of groups?

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app