1. ACFE Occupational Fraud & Abuse Report
2. NSA INFOSEC Assessment
Methodology (IAM)
3. Dawn
Requires Free Membership to View
4. Kelly Martin: U.S. Gov't Mandates Laptop Security
5. Sharon Gaudin: Case Study of Insider Sabotage
INSIDER THREAT MANAGEMENT GUIDE
Introduction: Insider threat management
Data organization and impact analysis
Baseline management and control
Implementation of baseline control
Risk management audit
This was first published in August 2006
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation