Insider Threat Management Guide

In this Insider Threat Management Guide, contributor Gideon Rasmussen reviews how to fortify your organization's current insider threat controls and keep internal dangers to a minimum.

By Gideon T. Rasmussen

The threat posed by authorized personnel is well documented by research and court cases. According to ACFE, U.S. organizations lose an estimated $652 billion to fraud annually. Unfortunately, insider threat is not limited to fraud. There is also sabotage, negligence, human error and exploitation by outsiders to consider. If you have not taken a hard look at insider threat controls in your organization, now is the time.


  INSIDER THREAT MANAGEMENT GUIDE

   Introduction: Insider threat management
    Data organization and impact analysis
    Baseline management and control
    Implementation of baseline control
    Risk management audit
    Risk management references
 

About the author
Gideon T. Rasmussen is a Charlotte-based certified information security professional with a background in fortune 50 and military organizations. His Web site is http://www.gideonrasmussen.com/.

This was first published in August 2006

Dig Deeper

PRO+

Content

Find more PRO+ content and other member only offers, here.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close