Skip to Content

Understanding Insider Threats

Format: On-demand

Organizations are becoming aware of cybersecurity threats, especially those coming from inside. However, it has always been hard to separate incidents caused by insiders from general data breaches. The number of insider-related breaches rises every year. This is why auditing insider threat programs should be a standard activity within the annual audit plan.

This course will define insider threats and describe the risks of insiders becoming a threat to the organization.

Available Formats