Video Training Course
Most data breaches start with an insider. This course gives you an in-depth look at where insider threats originate from, which assets they target, and defensive measures that can detect and prevent insiders from exfiltrating data. 💀
Watch three lessons below right now. Then register to unlock the rest.
|2. Where Insider Threats Originate From||4:48|
|3. Assets Targeted by Insiders||10:19|
|4. The Threat of Malicious Insiders||9:00|
|5. The Risk of Unintentional Insiders||8:25|
|6. How Insiders Exfiltrate Data||7:45|
|7. Defensive Measures||11:52|
Troy is a Pluralsight author, Microsoft MVP, and world-renowned internet security specialist. He’s also the creator of “Have I been pwned?”, the free online service for breach monitoring and notifications.
Duration: 1h 3m