Insider threat : prevention, detection, mitigation, and deterrence / Michael G. Gelles, Psy.D.

By: Gelles, Michael G [author.].
Contributor(s): Gale (Firm).
Series: Gale eBooks.Description: 1 online resource (xviii, 234 pages) : illustrations (chiefly color).Content type: text Media type: computer Carrier type: online resourceISBN: 9780128026229.Subject(s): Business enterprises -- Security measures | Employee crimes -- Prevention | Risk assessmentDDC classification: 658.47 Online resources: Available via Gale eBooks. Click here to access
Contents:
chapter 1. Introduction - insider threat today -- chapter 2. Common challenges to maturing an insider threat program -- chapter 3. From bricks and mortar to bits and bytes -- chapter 4. Identifying functional ownership -- chapter 5. Identifying critical indicators in organizational data -- chapter 6. Establishing an organizational risk appetite -- chapter 7. Risk management using data analytics -- chapter 8. Information security and technology integration -- chapter 9. Robust cyber risk management -- chapter 10. Threats posed by third-party insiders : considerations for a vendor vetting program -- chapter 11. Employee engagement : critical to mitigating the risk of insider threat -- chapter 12. Workplace violence and insider threat -- chapter 13. Monitoring and investigating -- chapter 14. Privacy considerations for insider threat mitigation programs -- chapter 15. What the future holds.
Summary: Presents a set of solutions to address the increase in cases of insider threat, including espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft. Focuses on management and employee engagement, as well as ethical, legal, and privacy concerns. Also includes tactics on how to collect, correlate, and visualize potential risk indicators into a seamless system for protecting an organization's critical assets.
No physical items for this record

Includes bibliographical references and index.

chapter 1. Introduction - insider threat today -- chapter 2. Common challenges to maturing an insider threat program -- chapter 3. From bricks and mortar to bits and bytes -- chapter 4. Identifying functional ownership -- chapter 5. Identifying critical indicators in organizational data -- chapter 6. Establishing an organizational risk appetite -- chapter 7. Risk management using data analytics -- chapter 8. Information security and technology integration -- chapter 9. Robust cyber risk management -- chapter 10. Threats posed by third-party insiders : considerations for a vendor vetting program -- chapter 11. Employee engagement : critical to mitigating the risk of insider threat -- chapter 12. Workplace violence and insider threat -- chapter 13. Monitoring and investigating -- chapter 14. Privacy considerations for insider threat mitigation programs -- chapter 15. What the future holds.

Presents a set of solutions to address the increase in cases of insider threat, including espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft. Focuses on management and employee engagement, as well as ethical, legal, and privacy concerns. Also includes tactics on how to collect, correlate, and visualize potential risk indicators into a seamless system for protecting an organization's critical assets.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer