Insider Threat Comments PDF

Title Insider Threat Comments
Author shaik barakhat
Course Professional & Ethical Iss Cs
Institution University of North Carolina Wilmington
Pages 2
File Size 44.6 KB
File Type PDF
Total Downloads 61
Total Views 133

Summary

Download Insider Threat Comments PDF


Description

Cyber Threat Cyber Hawks Joshua, Almet, Hilmi, Greg Chrys :     

Good Improvement Put few words into the slides Look + feel consistent throughout the slides Tie every branch to the incident so your point is coming across clearly Good solution + examples Strong Closing

Ron : Bullet Point  Alert Slides – Good Examples (Prioritization of Alerts is an issue) (Companies don’t know how to respond to the alerts)  Saas  Remote Access – Authorization remote Employees +(Contractors -> V.I.P)  User privilege; privilege acceleration Kevin:  

If there’s Date, What happened?, What is Important Good Graphics for working remotely (Reference source is given) Last slides Q/A highlight the parameter

Keyboard Warriors Kinsley Lukmon, Cagatay,Asli,Naz Chrys:  

2nd Title update , Grammatically incorrect Great Info, nothing to tie back to the incident, no solutions Informative, but not accountable

Ron:    

Profiles Good Info, Reference studies with intrusion detection – behavioral CISO interest in employee surveillance, gathering resources to support The idea implemented is different Good Information/Good examples Good references

Kevin :   



Good Aesthetics First 5 slides , get rid of the bullet points Great transition P5 + 6 incomplete P5 -> 5G incomplete, IOT incomplete P6 -> how + what didn’t have text (incomplete) Good Ending FrancB Kohl John - How to Wow...


Similar Free PDFs