Understanding the insider threat

Understanding the insider threat

Understanding the insider threat

Date: Jun 25, 2012

Many enterprise companies often struggle with insider threat, whether it's intentional or accidental. This threat extends throughout every aspect of an organization, so it's vital to mitigate any threat that presents itself to the company.

In this video, Dawn Cappelli, a member of the Technical Staff in CERT at Carnegie Mellon University's Software Institute, outlines three different types of intentional insider threats. She describes all three and explains what patterns to watch for in each of those crimes. She'll also provide the tools needed to develop mitigation strategies for each type of crime.

The three types of intentional insider crimes covered are insider IT sabotage, fraud and the theft of intellectual property. 

About the presenter: Dawn Cappelli is a Senior Member of the Technical Staff in CERT at Carnegie Mellon University's Software Engineering Institute (SEI). She has over 25 years experience in software engineering, including programming, technical project management, information security, and research. She is technical lead of CERTs insider threat research, including the Insider Threat Study conducted jointly by the U.S. Secret Service and CERT.

More on Information Security Incident Response-Information

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: