Download Artifact

Defeating Insider Threats
Defeating Insider Threats

Defeating Insider Threats

As a follow up to the Top Threats in Cloud Computing and from the months of May to July 2016 we surveyed approximately 100 professionals on the extent of the following: Employees leaking critical information and tradecraft on illicit sites Data types and formats being exfiltrated along with exfiltration mechanisms Why so many data threats go undetected What happens to the data after it has been exfiltrated Tools to disrupt and prevent the data exfiltration cycle Possibilities to expunge traces of data once exfiltrated

Release Date: 10/19/2016

Request to Download

Address Information

Having read and understood the CSA’s Privacy Policy,

I specifically consent to receive marketing messages via the following channels: