- Threat Detection, Investigation, and Response (TDIR) Use Case Categories
- Threat Detection, Investigation, and Response (TDIR) Use Case Categories Hierarchy
- Compromised Insiders Use Case Category
- External Threats Use Case Category
- Malicious Insiders Use Case Category
PrevNext
Data Leak Scenario
Learn about the Data Leak Data Leak scenario.
The Data Leak scenario describes when an insider illicitly exfiltrates data outside your organization using any method, including transferring over the internet, sending a copy to a personal email, downloading it to a removable device, or printing a physical copy and moving it outside your premises. Data leaks are one of the biggest threats to an organization and can harm your organization's operations, finances, and reputation.
In the Threat Detection, Investigation, and Response (TDIR) Use Case Categories hierarchy, the Data Leak scenario falls under the Data Leak use case.