Star 0

Abstract

There is no technological panacea for insider threats. As technologies mature and organizations learn which practices are most effective, the security equation is changing. People don’t wake up one morning and decide to exploit confidential information. We will discuss the intersection of technology and behavior to identify best practices and develop a plan to implement.