Star 0

Abstract

Most data breaches start from the inside, via social engineering, third-party access, carelessness, intentional misuse, etc. Join us for a lighthearted look at a serious problem: managing your level of risk at “the human layer.” Find out what practices and policies provide the most protection from The Gullible Assistant, The Careless Vendor, The Road Warrior, The Absent-Minded Executive and more.