This is a dedicated watch page for a single video.
As the Chief Information Security Officer (CISO) of ThorTeaches.com, Jay has been informed that the company's networks have been breached and sensitive data has been stolen. He suspects that the breach may have been caused by an insider threat. How should he proceed?