Presents a set of solutions to address the increase in cases of insider threat, including espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft. Focuses on management and employee engagement, as well as ethical, legal, and privacy concerns. Also in
Insider Threat. Prevention, Detection, Mitigation, and Deterrence
β Scribed by Michael G. Gelles
- Publisher
- Butterworth-Heinemann
- Year
- 2016
- Tongue
- English
- Leaves
- 234
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions to address the increase in cases of insider threat. This includes espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft from current or former employees. This book outlines a step-by-step path for developing an insider threat program within any organization, focusing on management and employee engagement, as well as ethical, legal, and privacy concerns. In addition, it includes tactics on how to collect, correlate, and visualize potential risk indicators into a seamless system for protecting an organizationβs critical assets from malicious, complacent, and ignorant insiders. Insider Threat presents robust mitigation strategies that will interrupt the forward motion of a potential insider who intends to do harm to a company or its employees, as well as an understanding of supply chain risk and cyber security, as they relate to insider threat.
- Offers an ideal resource for executives and managers who want the latest information available on protecting their organizationβs assets from this growing threat
- Shows how departments across an entire organization can bring disparate, but related, information together to promote the early identification of insider threats
- Provides an in-depth explanation of mitigating supply chain risk
- Outlines progressive approaches to cyber security
β¦ Table of Contents
Content:
Front-matter,Copyright,About Deloitte,About the Author,Foreword,AcknowledgmentsEntitled to full textChapter 1 - Introduction β Insider Threat Today, Pages 1-18
Chapter 2 - Common Challenges to Maturing an Insider Threat Program, Pages 19-37
Chapter 3 - From Bricks and Mortar to Bits and Bytes, Pages 39-49
Chapter 4 - Identifying Functional Ownership, Pages 51-64
Chapter 5 - Identifying Critical Indicators in Organizational Data, Pages 65-79
Chapter 6 - Establishing an Organizational Risk Appetite, Pages 81-95
Chapter 7 - Risk Management Using Data Analytics, Pages 97-112
Chapter 8 - Information Security and Technology Integration, Pages 113-123
Chapter 9 - Robust Cyber Risk Management, Pages 125-136
Chapter 10 - Threats Posed by Third-Party Insiders: Considerations for a Vendor Vetting Program, Pages 137-147
Chapter 11 - Employee Engagement: Critical to Mitigating the Risk of Insider Threat, Pages 149-158
Chapter 12 - Workplace Violence and Insider Threat, Pages 159-168
Chapter 13 - Monitoring and Investigating, Pages 169-181
Chapter 14 - Privacy Considerations for Insider Threat Mitigation Programs, Pages 183-193
Chapter 15 - What the Future Holds, Pages 195-203
Appendices, Pages 205-227
Index, Pages 229-234
β¦ Subjects
Business enterprises;Security measures;Employee crimes;Prevention;Risk assessment;BUSINESS & ECONOMICS;Industrial Management;BUSINESS & ECONOMICS;Management;BUSINESS & ECONOMICS;Management Science;BUSINESS & ECONOMICS;Organizational Behavior
π SIMILAR VOLUMES
<p><span>Surveillance and Threat Detection</span><span> offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. </span></p><p><span>Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance a
It's often said that the 21st century is characterized by a flat world in which globalization, technology, and the Internet have each contributed to level the economic playing field. But for companies that manufacture and sell their products internationally, the world is not exactly flat -- it is ti