Defending Against Insider Threats
Click here to view now
Overview: Recent events, such as the WikiLeaks breach have brought the problem of insider threats to the forefront. Effective management of insider threats involves a variety of areas, including privileged user management, Web access management, and information classification and control.
This video explores some innovative approaches to identifying and remediating the threat of improper insider actions on your overall IT infrastructure.