FREE COURSE | +1 CPE
The Enemy Within: Understanding Insider Threats
Most data breaches start with an insider. This course gives you an in-depth look at where insider threats originate from, which assets they target, and defensive measures that can detect and prevent insiders from exfiltrating data. 💀
Start the course:
01 - Enemy Within: Introduction
02 - Where Insider Threats Originate From
03 - Assets Targeted by Insiders
04 - The Threat of Malicious Insiders
05 - The Risk of Unintentional Insiders
06 - How Insiders Exfiltrate Data
07 - Defensive Measures
08 - Summary
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
Varonis shows you where sensitive data is concentrated and automatically remediates overexposure—getting you to least privilege without human intervention. Our machine learning analyzes permissions and user behavior to highlight where users have access to data they don't use or need.