Closeup of a person’s hands typing on a laptop.

Summary

Securing our information resources is vital to our success and it cannot be achieved without your help.

We are counting on you to apply what you have learned from this course to help deter, detect, and prevent insider threats.