Video Training Course
Most data breaches start with an insider. This course gives you an in-depth look at where insider threats originate from, which assets they target, and defensive measures that can detect and prevent insiders from exfiltrating data. 💀 (NOTE: You might want to bookmark this page so you can come back to it later without filling out the form again. :-)
|2. Where Insider Threats Originate From||4:48|
|3. Assets Targeted by Insiders||10:19|
|4. The Threat of Malicious Insiders||9:00|
|5. The Risk of Unintentional Insiders||8:25|
|6. How Insiders Exfiltrate Data||7:45|
|7. Defensive Measures||11:52|
We'll setup a personalized 20-minute demo and give you a tour of our user behavior analytics features.
NEXT: Want more from Troy? Check out our Web Security Fundamentals course!
Troy is a Pluralsight author, Microsoft MVP, and world-renowned internet security specialist. He’s also the creator of “Have I been pwned?”, the free online service for breach monitoring and notifications.
Duration: 1h 3m