Whitepaper · Database Doctrine Series

The Data Heist Kill Chain

Mapping Attacker Progression from Identity Compromise to Monetisation

An End-to-End Operating Model for Stopping Data Theft

Institutional Doctrine · Schiphol University · Kieran Upadrasta · 2026

Database Security Governance & Risk Doctrine
Download PDF All publications