1. ACFE Occupational Fraud & Abuse Report 2. NSA INFOSEC Assessment Methodology (IAM) 3. Dawn Cappelli: Preventing...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Insider Sabotage 4. Kelly Martin: U.S. Gov't Mandates Laptop Security 5. Sharon Gaudin: Case Study of Insider Sabotage
INSIDER THREAT MANAGEMENT GUIDE
Introduction: Insider threat management
Data organization and impact analysis
Baseline management and control
Implementation of baseline control
Risk management audit