Free Workshop: Investigating Insider Threats — February 20-27

Exfiltration

Attackers who want to steal information must find a way to get a copy. This exfiltration can be made more difficult with strong networking and storage security policies.