In most cases, DCAP (data-centric audit and protection) and DAM (database activity monitoring) are sufficient. Protection against insider risks works when the process involves controlling the data transfer channels or examining data sources. A DAM solution would be helpful, here you can browse more information about the DAM system tactics. In the event of a violation, it can take up to a year for the damage to be identified; depending on the size of the business, this damage can range from thousands up to millions of dollars.
Source: https://thehackernews.com/2021/05/can-data-protection-systems-prevent.html

