search menu icon-carat-right cmu-wordmark

Detecting Insider Threats with Netflow

January 2013 • Presentation

In this presentation, Tom Cross describes the challenges of mitigating insider threat, discusses who commits insider attacks, and describes IT sabotage detection.

Publisher:

Software Engineering Institute

Abstract

In this presentation, Tom Cross describes the challenges of mitigating insider threat, discusses who commits insider attacks, and describes IT sabotage detection.