Insider Threat: Detection, Mitigation, Deterrence and Prevention

Insider Threat: Detection, Mitigation, Deterrence and Prevention

Gelles, Michael G.
Turner, James

37,39 €(IVA inc.)

Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions to address the increase in cases of espionage, embezzlement, sabotage, and identify theft from current or former employees. The book provides a complete roadmap for developing an insider threat program within any organization, focusing on management, training, ethical, and legal concerns. In addition, the book includes tactics on how to correlate human behavioral indicators and data analytic tools into a seamless system for protecting an organization's critical assets from insiders intending to do harm. Users will find a resource that presents robust mitigation strategies that will interrupt the forward motion of a potential insider who intends to do harm to a company or its employees. Presents a set of solutions to address the increase in cases of espionage, embezzlement, sabotage, and identify theft from current or former employeesIdeal for executives and managers who want the latest information available on protecting their organization's assets from these growing threatsProvides a complete roadmap for developing an insider threat program within any organizationFocuses on the management, training, ethical and legal concerns necessary for developing an insider threat programShows how departments across an entire organization can bring disparate, but related, information together to promote the early identification of insider threats Covers robust mitigation strategies that interrupt the forward motion of insider threats INDICE: Introduction: A Leader's Guide to Insider Threat Chapter 1: History of Insider Threat Chapter 2: The Global and Virtual Age of Business Chapter 3: From Bricks and Mortar to Bits and Bytes Chapter 4: Identifying Critical Indicators in Organizational Data Chapter 5: Developing an Insider Threat Mitigations Program Chapter 6: Establishing an Organizational Risk Level Chapter 7: Managing People to Mitigate Risk Chapter 8: The Role of Social Media Chapter 9: Risk Management Using Data Analytics Chapter 10: Information Security and Technology Integration Chapter 11: Training and Culture Change to mitigate insider threat Chapter 12: Monitoring and Investigating Insider Threat Chapter 13: Insider Threat and Workplace Violence Chapter 14: Privacy, Ethical and Legal Concerns to developing an insider threat program Chapter 15: What the Future Holds

  • ISBN: 978-0-12-802410-2
  • Editorial: Butterworth-Heinemann
  • Encuadernacion: Rústica
  • Páginas: 240
  • Fecha Publicación: 01/09/2015
  • Nº Volúmenes: 1
  • Idioma: Inglés