Combat Insider Threat - Proven Strategies from CERT

Description

Faced with increasing threats of IT sabotage from trusted insiders, who continue to gain access to critical corporate data, most organizations struggle to address this evolving security threat. Where do you turn? By analyzing case studies from their Insider Threat Case Database, the experts at CERT have developed the most effective strategies for detecting and combating insider threat.


Share