Title | Insider Threat Comments |
---|---|
Author | shaik barakhat |
Course | Professional & Ethical Iss Cs |
Institution | University of North Carolina Wilmington |
Pages | 2 |
File Size | 44.6 KB |
File Type | |
Total Downloads | 61 |
Total Views | 133 |
Download Insider Threat Comments PDF
Cyber Threat Cyber Hawks Joshua, Almet, Hilmi, Greg Chrys :
Good Improvement Put few words into the slides Look + feel consistent throughout the slides Tie every branch to the incident so your point is coming across clearly Good solution + examples Strong Closing
Ron : Bullet Point Alert Slides – Good Examples (Prioritization of Alerts is an issue) (Companies don’t know how to respond to the alerts) Saas Remote Access – Authorization remote Employees +(Contractors -> V.I.P) User privilege; privilege acceleration Kevin:
If there’s Date, What happened?, What is Important Good Graphics for working remotely (Reference source is given) Last slides Q/A highlight the parameter
Keyboard Warriors Kinsley Lukmon, Cagatay,Asli,Naz Chrys:
2nd Title update , Grammatically incorrect Great Info, nothing to tie back to the incident, no solutions Informative, but not accountable
Ron:
Profiles Good Info, Reference studies with intrusion detection – behavioral CISO interest in employee surveillance, gathering resources to support The idea implemented is different Good Information/Good examples Good references
Kevin :
Good Aesthetics First 5 slides , get rid of the bullet points Great transition P5 + 6 incomplete P5 -> 5G incomplete, IOT incomplete P6 -> how + what didn’t have text (incomplete) Good Ending FrancB Kohl John - How to Wow...