Dec. 18, 2023, 3:30 p.m. | Neel Lukka

SC Magazine feed for Risk Management www.scmagazine.com

Here are three pillars for an effective insider threat program.

employee insider insider threat insider threat program ip theft privileged access management program theft threat

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Lead Technical Product Manager - Threat Protection

@ Mastercard | Remote - United Kingdom

Data Privacy Officer

@ Banco Popular | San Juan, PR

GRC Security Program Manager

@ Meta | Bellevue, WA | Menlo Park, CA | Washington, DC | New York City

Cyber Security Engineer

@ ASSYSTEM | Warrington, United Kingdom

Privacy Engineer, Technical Audit

@ Meta | Menlo Park, CA