Understanding the insider threat

Many enterprise companies often struggle with insider threat, whether it's intentional or accidental. This threat extends throughout every aspect of an organization, so it's vital to mitigate any threat that presents itself to the company.

In this video, Dawn Cappelli, a member of the Technical Staff in CERT at Carnegie Mellon University's Software Institute, outlines three different types of intentional insider threats. She describes all three and explains what patterns to watch for in each of those crimes. She'll also provide the tools needed to develop mitigation strategies for each type of crime.

The three types of intentional insider crimes covered are insider IT sabotage, fraud and the theft of intellectual property. 

About the presenter: Dawn Cappelli is a Senior Member of the Technical Staff in CERT at Carnegie Mellon University's Software Engineering Institute (SEI). She has over 25 years experience in software engineering, including programming, technical project management, information security, and research. She is technical lead of CERTs insider threat research, including the Insider Threat Study conducted jointly by the U.S. Secret Service and CERT.

View All Videos

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

upload new software for hacking face book passwords
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close