Watching the watchers

Data Protection Security School

Watching the watchers

Andreas Antonopoulos
In this Data Protection Security School lesson, expert Andreas explores how to monitor the activities of your most trusted insiders with a combination of policy, process and technology to keep unauthorized access and data loss to a minimum.

Watch the video, listen to the podcast, read the tech tip then take the quiz to see how much you have learned. Passing the quiz earns you one CPE credit from (ISC)².

View our Security School Course Catalog to view more lessons eligible for CPE credits.

About the author:
Andreas M. Antonopoulos is the former senior vice president of Nemertes Research.

In this part:

Tip: Role-based access control for effective security management

Effective role-based access control is vital for properly managing user access rights and enforcing access policies, but avoiding role sprawl can be challenging.

Tip: Privileged user access management: How to avoid access creep

One of the most difficult areas of privileged user access management is avoiding access creep. John Burke covers how to keep privileged users in check.

Podcast: 5 Common Missteps with Trusted Insider Privileges

Insiders with elevated privileges are trusted with the keys to the kingdom; they're also prime targets for abuse from outsiders. In this podcast, you’ll learn five quick fixes to lessen the risk posed by trusted insiders.

Quiz: Monitoring your trusted insiders

How much have you learned about monitoring your privileged insiders? Test your knowledge in this short quiz.

Take the quiz