Defeating Insider Threats
Release Date: 10/19/2016
Employees leaking critical information and tradecraft on illicit sites
Data types and formats being exfiltrated along with exfiltration mechanisms
Why so many data threats go undetected
What happens to the data after it has been exfiltrated
Tools to disrupt and prevent the data exfiltration cycle
Possibilities to expunge traces of data once exfiltrated
You’ve made safer cloud computing possible.
CSA is a community driven organization. We would like to send you updates about our ongoing initiatives and opportunities to participate.