When employees plan to leave an organisation, they sometimes use their access rights to steal intellectual property or other data they can use in their next job, or to delete content out of spite. To mitigate these risks effectively, organisations need a clear understanding of what techniques are most likely to be exploited and which activity is a sign of an insider threat in progress.
Watch this on-demand webinar with Brian Johnson where he explains how to spot data theft attempts in real time by watching for events such as: