Requires Free Membership to View
http://www.schneier.com/blog/archives/2005/12/insider_threat.html
http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=104&STORY=/www/story/08-22-2005/0004091867&EDATE
http://www.viack.com/_download/200408_cdm.pdf
Each survey describes the persistent and pernicious insider problem of many employees inadvertently or purposely putting their organizations at risk. However, these surveys can be inconsistent, especially the ones that compare the number of external attacks to internal attacks (from employees, etc.). Some surveys show a huge number of external attacks, while others show a preponderance of the latter.
When discussing this threat with management, emphasize the need to defend against both insiders and outsiders, and how to leverage some tools across both threats, while using other tools that focus predominantly on one or the other. If you put all of your defensive eggs in the outsider threat basket, your organization could be in serious peril. Thus, a blended approach is vital.
More Information
This was first published in August 2006
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation