DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home Quotes

“It’s really hard to identify if…”

Irena Mroz

Reading Time: 1 min read
in Insider Threat, Quotes

“It’s really hard to identify if your users are doing something they’re not supposed to do. After all, they’re supposed to use your data in their day to day job so trying to go back and take a look at what they’ve access and try and determine what they’ve done is difficult and time consuming. And it’s certainly one area where that old saying of an ounce of prevention, really applies.” Irena Mroz – Chief Marketing Officer at archTIS

Source: INFOSEC Institute

About Irena Mroz:

Irena Mroz is CMO at archTIS and is responsible for defining the company’s branding, demand generation and public relations. Prior to archTIS, Mroz served as the Vice President of Marketing for Nucleus Cyber acquired by archTIS in 2020. She led the merger of the two companies marketing and brands, while managing development of all strategic marketing programs and communications for the joint entity. An innovative strategist with impeccable attention to detail, Mroz leverages 20+ years of B2B software marketing expertise to direct the company’s marketing strategy and communications programs.

Tags: Insider ThreatInsider Threat QuoteIrena MrozIt’s really hard to identify if your users are doing something they’re not supposed to doQuote
ADVERTISEMENT

Related Posts

Cisco CCNP Security Certification

Cisco CCNP Security Certification

August 17, 2023
“Awareness of your workforce…”

“Awareness of your workforce…”

July 6, 2023
“Criminals and nation-state attackers…”

“Criminals and nation-state attackers…”

July 6, 2023
“In a nutshell, this new malware…”

“In a nutshell, this new malware…”

July 6, 2023

More Articles

Course

Certified Data Protection Officer (CDPO)

March 24, 2022
News

Microsoft Brings OpenAI Language Models

June 9, 2023
Alerts

New Go-based Redigo malware targets Redis servers

December 5, 2022

Customer services firm Atento hit by cyberattack

October 22, 2021
Incidents

TA453 used new Multi-Persona Impersonation

September 13, 2022
Tool

CyberML™ (Cyber Modeling Language™)

March 7, 2022
Incidents

Cyberattack Exposes Vermont Health Data

June 19, 2023
Alerts

CISA Releases Two Industrial Control Systems Advisories

November 17, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.