2018 brought a new series of examples of how a malicious employee can wreak havoc by taking bribes to leak information, or just by stealing information before and after leaving the job.
In this webinar, you will learn:
How to build an IT policy that works for the company's security, and employee's usability
How to detect malicious activity, and also prevent unwitting errors
What the common signs of malicious action are
What you can learn from some of 2018's headlines