Terminology Advanced Persistent Threats Network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The intention of an APT attack is to steal data rather than to cause damage to the network or organization. Compliance Act of adhering to, and demonstrating adherence to, federal laws and regulations as well as organizational policies and procedures. Enterprise GRC GRC applied to the wider organization, including operations, HR, Legal, and IT. Full Network Packet Capture The unrestricted, unfiltered, raw capture of all network packets. Governance Policies, standards, processes, laws, and regulations that define the structure by which companies are directed and managed. IT GRC GRC applied to the IT organization, including its systems, technologies, and processes. Malware Code that can cause business interruption, disclosure, or modification of sensitive information. Risk Management Published by Articulate® Engage™ www.articulate.com Coordinated activities to understand, direct, and control an organization to realize and make decisions upon opportunities while managing negative risk events. Sandboxing Mechanism to execute untested code or untrusted programs from unverified third-parties, suppliers, untrusted users, and untrusted websites. Published by Articulate® Engage™ www.articulate.com