Watch this video on YouTube
At which stage of the lifecycle of a data exfiltration attack might access control monitoring detect the attack?