In this course, we’ll look at what insiders are doing that puts data at risk, the changes in the digital landscape that have opened up a whole bunch of exfiltration vectors, and other external factors that inform how you build your program, including who needs a seat at the table when you do.