Format: On-demand
Nano learning: delivering bite-sized, focused lessons with videos and interactive elements, so you can gain new skills anytime, anywhere, 10 minutes at a time.
Organizations are becoming aware of cybersecurity threats, especially those coming from inside. However, it has always been hard to separate incidents caused by insiders from general data breaches. The number of insider-related breaches rises every year. This is why auditing insider threat programs should be a standard activity within the annual audit plan.
This course will define insider threats and describe the risks of insiders becoming a threat to the organization.