Quick words

It has always been astounding about the amount of attack surfaces that we have within an organization for insider to exfiltrate data out of the organization.

The goal of this series is not to provide complete guidance on how to mitigate Insider Threat. There are tons of resources out there for that, for example, an official resource from CISA (link). This series will provide some example how we can approach the Insider Threat from different angles: