Insider Threat

Prevention, Detection, Mitigation, and Deterrence
 
 
Butterworth-Heinemann (Verlag)
  • 1. Auflage
  • |
  • erschienen am 28. Mai 2016
  • |
  • 252 Seiten
 
E-Book | ePUB mit Adobe DRM | Systemvoraussetzungen
E-Book | ePUB mit Adobe DRM | Systemvoraussetzungen
978-0-12-802622-9 (ISBN)
 

Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions to address the increase in cases of insider threat. This includes espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft from current or former employees. This book outlines a step-by-step path for developing an insider threat program within any organization, focusing on management and employee engagement, as well as ethical, legal, and privacy concerns. In addition, it includes tactics on how to collect, correlate, and visualize potential risk indicators into a seamless system for protecting an organization's critical assets from malicious, complacent, and ignorant insiders. Insider Threat presents robust mitigation strategies that will interrupt the forward motion of a potential insider who intends to do harm to a company or its employees, as well as an understanding of supply chain risk and cyber security, as they relate to insider threat.


  • Offers an ideal resource for executives and managers who want the latest information available on protecting their organization's assets from this growing threat
  • Shows how departments across an entire organization can bring disparate, but related, information together to promote the early identification of insider threats
  • Provides an in-depth explanation of mitigating supply chain risk
  • Outlines progressive approaches to cyber security


Dr. Michael Gelles consults in security, intelligence, and law enforcement for Deloitte in Washington, D.C. and is a thought-leader on the security risks, asset exploitation, and workplace violence associated with insider threat. Dr. Gelles is a frequent lecturer and has written numerous articles and book chapters on organizational management, forensic psychology, law enforcement, terrorism, and counterintelligence.
  • Englisch
  • San Diego
  • |
  • USA
Elsevier Science
  • 14,94 MB
978-0-12-802622-9 (9780128026229)
0128026227 (0128026227)
weitere Ausgaben werden ermittelt
  • Front Cover
  • Insider Threat
  • Copyright Page
  • Contents
  • About Deloitte
  • About the Author
  • Foreword
  • Acknowledgments
  • 1 Introduction - Insider Threat Today
  • Introduction
  • Looking Ahead
  • This Book
  • What is Insider Threat?
  • What Motivates an Insider to Act?
  • Environmental Drivers
  • "Bricks and Mortar" to "Bits and Bytes"
  • The Virtual Space
  • Exfiltration Points
  • Technology and the Insider Threat
  • Changing Workplace Demographics
  • Social Media and Validation:
  • A Technical Workforce:
  • Expectations of Ownership:
  • Limited Control:
  • Challenges Managing Information:
  • Information Mobility
  • Detecting the Insider Threat
  • Patterns of Behavior
  • Mitigating Asset Loss: An Integrated Approach
  • Defining Critical Assets
  • Detection
  • Developing a Secure Workforce
  • Establishing a Workforce Culture to Mitigate Risk
  • Top 10 Tips for Leaders
  • 1 Define The Insider Threats
  • 2 Define Your Risk Appetite
  • 3 Optimize a Broad Set of Stakeholders
  • 4 Don't Forget the Fundamentals
  • 5 Trust but Verify
  • 6 Look for Precursors
  • 7 Connect the Dots
  • 8 Stay a Step Ahead
  • 9 Set Behavioral Expectations
  • 10 One Size Does Not Fit All
  • In Summary
  • Key Takeaways
  • 2 Common Challenges to Maturing an Insider Threat Program
  • Introduction
  • Challenges Faced by Program Managers
  • Are There More Insider Threat Cases Now Than There Have Been in the Past?
  • How Does an Organization Define Insider Threat?
  • Why Do Insider Threat Programs Need to Look Beyond the Malicious Insider?
  • Why Are Insider Threat Related Policies and Training Important?
  • What Capabilities Differentiate an Industry-Leading Insider Threat Program?
  • How Do I Escalate and Triage Potential Threats Identified by the Program?
  • How Do I Position an Insider Threat Program to My Workforce?
  • How Do I Scale My Insider Threat Program?
  • What are the Skillsets a Leading Program Needs to Have?
  • What Data are Needed to Proactively Identify Potential Insiders?
  • How Do I Evaluate and Select an Advanced Analytics Tool?
  • What Challenges are Generally Encountered When Standing Up a Program?
  • How Mature Does My Program Have to Be?
  • How do You Measure the Return on Investment?
  • Key Metrics
  • A Global Perspective
  • Key Takeaways
  • 3 From Bricks and Mortar to Bits and Bytes
  • The Transformation from Bricks and Mortar to Bits and Bytes
  • Insider Threat in a World of Bricks and Mortar
  • Transitional Phase
  • Insider Threat in a World of Bits and Bytes
  • Same Behavior, Different Context
  • Is Insider Activity More Prevalent Now?
  • The Workforce in a World of Bits and Bytes
  • Mitigating the Insider Threat in the World of Bits and Bytes
  • The Insider Threat of Bits and Bytes: A Case Study
  • Key Takeaways
  • 4 Identifying Functional Ownership
  • Introduction
  • Program Location
  • Executive Support
  • Independence
  • Collaboration
  • Developing a Program to Prevent, Detect, and Respond Framework
  • Program Ownership
  • Functional Assessment in Choosing a Program Owner
  • Program Design
  • Strategic Framework
  • Program Assumptions
  • Program Guiding Principles
  • Four Program Pillars
  • Governance Structure and Roles and Responsibilities
  • Governance Structure
  • Program Communication and Change Management Plan
  • Incident Response Process
  • Ongoing Updates and Process Improvements
  • Key Challenges
  • Key Takeaways
  • 5 Identifying Critical Indicators in Organizational Data
  • Potential Risk Indicators
  • Contextual Indicators
  • Virtual Indicators
  • Nonvirtual Indicators
  • Translating Knowledge about Insiders Into Organizational Data
  • Identifying Critical Indicators Throughout the Organization
  • Key Challenges
  • Key Takeaways
  • 6 Establishing an Organizational Risk Appetite
  • Risk Tolerance Defined
  • Gathering Key Stakeholders a Critical First Step in Defining and Prioritizing Risk Tolerance
  • Defining Your Organization's Critical Assets
  • Determining the Threat Insiders Pose to Your Critical Assets
  • Balancing Security Investments and Tolerance for Loss
  • Re-evaluating Asset Prioritization
  • In Summary
  • Case Study 1: Financial Services Firm
  • Case Study 2: Health Care Provider
  • Case Study 3: Telecommunications, Media, and Technology
  • Key Takeaways
  • 7 Risk Management Using Data Analytics
  • Introduction to Advanced Analytics
  • Growing Consensus
  • Guiding Principles
  • Advanced Analytics in Motion
  • Use Case
  • The Solution
  • Visualization
  • Advantages
  • Selecting the Right Tool
  • Business Rule Approach and Development
  • Advanced Analytics Security
  • Security Analytics as a Business Enabler
  • Aggregate Data to Enhance Productivity
  • Policy Enhancements
  • Business Processes Enhancements
  • Key Takeaways
  • 8 Information Security and Technology Integration
  • Introduction
  • Administrative and Procedural Controls
  • Improving the IT Culture Through Administrative Controls
  • Building-In Versus Bolting-On
  • Training
  • Technical Controls
  • Identity and Access Management
  • User Activity Monitoring (UAM)
  • Physical Controls
  • Preventive Physical Controls
  • Detective Physical Controls
  • Future of Security Controls
  • Conclusion
  • Key Takeaways
  • 9 Robust Cyber Risk Management
  • Cyber Risk Management and Business Performance
  • Robust Mindsets: Secure, Vigilant, Resilient
  • Secure
  • Vigilant
  • Resilient
  • Insider Threat: A Dynamic, Multilevel Problem
  • Building Robust Mental Models and Collective Mindsets
  • Common Characteristics: Secure, Vigilant, Resilient Programs
  • Key Takeaways
  • 10 Threats Posed by Third-Party Insiders: Considerations for a Vendor Vetting Program
  • Introduction
  • Trends Driving Prevalence of Vendors in the U.S. Market
  • Examples of Threats Posed by Vendors
  • Information Breach
  • Workplace Violence
  • Commercial Cover
  • Supply Chain Infiltration
  • Unethical Sourcing
  • In Summary
  • Vendor Vetting Defined
  • Approach to Vendor Vetting
  • Basic: Level 1
  • Intermediate: Level 2
  • Advanced: Level 3
  • In-Depth: Level 4
  • Automated Vendor Vetting Solutions
  • Key Takeaways
  • 11 Employee Engagement: Critical to Mitigating the Risk of Insider Threat
  • Introduction
  • Understanding Why Employee Engagement is a Critical Issue
  • Engagement is a Critical Workforce Challenge Today
  • Workplace Drivers of Engagement
  • Measuring Employee Engagement
  • Improving and Sustaining Engagement
  • Key Takeaways
  • 12 Workplace Violence and Insider Threat
  • Introduction
  • A Historical but Cumulative View of Workplace Violence and Insider Threat
  • Key Concepts
  • Myths Regarding Workplace Violence
  • Warning Signs
  • Key Takeaways
  • 13 Monitoring and Investigating
  • Monitoring
  • Prioritizing a Monitoring Capability
  • Baseline Behavior
  • Communication
  • Escalation and Triage Process
  • Continuous Improvement
  • Responding to an Insider Threat
  • Response Team and Process
  • Conducting a Review: Escalation and Triage
  • What Escalation and Triage Looks Like
  • Results of an Inquiry
  • Key Takeaways
  • 14 Privacy Considerations for Insider Threat Mitigation Programs
  • Introduction
  • Data Privacy and the Collection of Potential Risk Indicators (PRIs)
  • Balancing Data Privacy with Effective Insider Threat Mitigation
  • The Privacy Impact Assessment (PIA)
  • Determining the Need for a PIA
  • Conducting the PIA
  • Additional Privacy Considerations
  • Conclusion
  • Key Takeaways
  • 15 What the Future Holds
  • Insider Threat: A Look Forward
  • The Changing Definition of Insider
  • Understanding the Macro Environment
  • Impact of Economic Downturns
  • Privacy Expectations
  • Policy Implications
  • Emerging Trends
  • Targeting Employees
  • Protecting the Entire Value-Chain
  • The Virtual Environment
  • Big Data and Risk Analytics
  • Scenario Planning
  • Scenario 1.0: Nearsighted/Farsighted
  • Scenario 2.0: Selective Views
  • Scenario 3.0: Unreconciled Perspectives
  • Scenario 4.0: 20/20 Vision
  • What's Next?
  • Appendices
  • Chapter 5
  • Appendix G: Business Assurance/ Insider Threat Working Group Charter
  • Introduction
  • Phase I Project Background
  • Phase II Project Objectives
  • Roles and Responsibilities
  • Membership
  • Authority
  • Communication
  • Appendix I: Business Rule Development
  • Appendix L: FAQs
  • Pilot Questions
  • Index
  • Back Cover

Dateiformat: EPUB
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat EPUB ist sehr gut für Romane und Sachbücher geeignet - also für "fließenden" Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

42,78 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
ePUB mit Adobe DRM
siehe Systemvoraussetzungen
E-Book bestellen

Unsere Web-Seiten verwenden Cookies. Mit der Nutzung dieser Web-Seiten erklären Sie sich damit einverstanden. Mehr Informationen finden Sie in unserem Datenschutzhinweis. Ok