Inside Job: Data Breach

Navigate the high-stakes initial response to a sophisticated insider threat that has compromised sensitive organizational data, testing your incident response protocols when the threat comes from within.

A employee with privileged access has deliberately exfiltrated sensitive data that is now surfacing on AI platforms and rapidly spreading to less secure environments. This breach puts your organization’s security and reputation at risk. Participants must navigate the breach response, focusing on containment, communication, and control validation.

Objectives:

  • Validate insider threat response protocols and/or playbook
  • Review of currency of access management controls
  • Validate internal communication protocols

this is where the syllubus goes

Additional information is here

No periods were set for this course

Scale scenario simulations. See how it works or book a personalized demo.Book a demo