In this episode of teissTalk we discussed:
- Making uncovering the intent of the insider your priority
- What to look for in behavioural analytics and end-user behaviour to identify the malicious, or non-malicious, insider threat
- Investing in your investigators and using understandable and enforceable policies