Incident Response, TDR

2015 insider threat ebook

Insiders come in various flavors, ranging from those with criminal intent to sell PII and credit card account numbers on the black market to absented-minded employees who lose a company-owned mobile device or forget to logout of their desktop at the end of the work day. As well, there are those employees who ordinarily would adhere to ethical principles, but find themselves susceptible to crossing the line for what they see as an easy payoff.

Regardless of the situation, the consensus of the experts we spoke with for this latest ebook from SC Magazine is that the continual deluge of high-profile cyber attacks during the past year reinforces the need for organizations to be cognizant of risks under their roofs. How can an organization thwart a privileged insider with an agenda? We discuss several tools, strategies and policies that today's organizations can put in place to manage privileged access and thwart abuse and incursions.

Click here to download this ebook on insider threats.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.