Reply To: OCU C)ISSO D Discussion Lesson 14

Kelly Crooks

Marcena, insider threats have always been a concern of mine as well. I think they have always been a concern because, as you said, individuals such as employees or contractors have access to the origination data. They have the authority to access sensitive data and information. There are too many variables that can play a role in the loss or theft of that data by those individuals. I think about what happened last month with the young man in the military stealing, copying, and sharing sensitive military data from the Pentagon. Even with all of the security protocols, procedures, policies, and background checks he was still able to leak that information. I often think that someone there wasn’t doing their job correctly.


Please Note:

The support ticket system is for technical questions and post-sale issues.


If you have pre-sale questions please use our chat feature or email .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.


Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  



We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense


The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!