All Articles tagged implementation
Scholarship In Practice
October 23, 2024 PDT An insider threat maturity model, created by synthesizing recommendations from multiple best practice documents. The design of the model and its application at a large multinational investment bank are detailed.