icon-carat-right menu search cmu-wordmark

Detecting Insider Threats with Netflow

• Presentation
In this presentation, Tom Cross describes the challenges of mitigating insider threat, discusses who commits insider attacks, and describes IT sabotage detection.
Publisher

Software Engineering Institute

Abstract

In this presentation, Tom Cross describes the challenges of mitigating insider threat, discusses who commits insider attacks, and describes IT sabotage detection.

Part of a Collection

FloCon 2013 Collection

This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.