SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

“It’s really hard to identify if…”

Irena Mroz

1 min read
in Quotes

“It’s really hard to identify if your users are doing something they’re not supposed to do. After all, they’re supposed to use your data in their day to day job so trying to go back and take a look at what they’ve access and try and determine what they’ve done is difficult and time consuming. And it’s certainly one area where that old saying of an ounce of prevention, really applies.” Irena Mroz – Chief Marketing Officer at archTIS

Source: INFOSEC Institute

About Irena Mroz:

Irena Mroz is CMO at archTIS and is responsible for defining the company’s branding, demand generation and public relations. Prior to archTIS, Mroz served as the Vice President of Marketing for Nucleus Cyber acquired by archTIS in 2020. She led the merger of the two companies marketing and brands, while managing development of all strategic marketing programs and communications for the joint entity. An innovative strategist with impeccable attention to detail, Mroz leverages 20+ years of B2B software marketing expertise to direct the company’s marketing strategy and communications programs.

Related

Tags: Insider ThreatInsider Threat QuoteIrena MrozIt’s really hard to identify if your users are doing something they’re not supposed to doQuote
16
VIEWS
ADVERTISEMENT

Related Posts

“As national security and war are being…”

“As national security and war are being…”

May 6, 2022
“There are more people in the U.S. protecting…”

“There are more people in the U.S. protecting…”

May 6, 2022
“Local governments today have significant…”

“Local governments today have significant…”

May 3, 2022
“Government organisations continue to…”

“Government organisations continue to…”

May 3, 2022

More Articles

Quotes

“We are in a cloud security transition…”

March 25, 2022
Entertainment

Inception (2010)

November 27, 2020
Document

SIEM and NDR: Better Together

March 15, 2022
Incidents

Morley Discloses Ransomware Attack

February 4, 2022

Security on Cloud – Podcast

March 25, 2022
Podcast

Women in Security Podcast

November 22, 2021

WebScarab

November 7, 2020

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

January 15, 2021
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials
  • Cyber Opportunities

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....