1. ACFE Occupational Fraud & Abuse Report 2. NSA INFOSEC Assessment Methodology (IAM) 3. Dawn Cappelli: Preventing...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Insider Sabotage 4. Kelly Martin: U.S. Gov't Mandates Laptop Security 5. Sharon Gaudin: Case Study of Insider Sabotage
INSIDER THREAT MANAGEMENT GUIDE
Introduction: Insider threat management
Data organization and impact analysis
Baseline management and control
Implementation of baseline control
Risk management audit