Close

Are you in compliance?

Don't miss out! Sign up today for our weekly newsletters and stay abreast of important GRC-related information and news.

×

Status message

Start your free, no obligation 5-day trial to continue exploring with full access.

Mitigating Cyber-Threats From the Inside Out

Jaclyn Jaeger | January 12, 2016

As attacks on corporate networks become more common, companies are getting more adept at protecting their most valuable assets against cyber-threats outside the company. But it’s the insider threats that continue to elude many.

Not all insider threats are malicious or intentional, so it is paramount that companies differentiate between the two. An internal employee who unknowingly grants unauthorized access to a user who has malicious intent—as opposed to an employee with access to sensitive corporate information trying to snitch it from the company—demand different response tactics.

Randy Trzeciak“One common misconception about building an insider-threat program is that it’s implying distrust of everyone in the organization,” says Randy Trzeciak, senior member of the technical staff for the Software Engineering...

Read this single article for $49, or click the subscribe button below to review subscription options.

Enjoy unlimited access to thousands of articles, browse five years of digital magazines, qualify for reduced admission to events, and more.