A comprehensive overview of insider threat management, this book adopts a systematic approach to assessing, monitoring, and mitigating security threats from insiders. Emphasizing the need for senior management awareness, training, and education, it includes a brief history of computer crime and hacking, analysis of significant insider threat types, legal and human resource implications, and practical strategies. Along with sample materials and templates in each chapter, it provides a glossary and references section to allow for further research into the concepts and theories presented in the book.
Introduction. The Human Factor. Balancing People, Process, and Technology. The Pros and Cons of Monitoring. The Legal Side. A Primer on Investigations. Management's Role. Resources.