Insider Threat
Butterworth-Heinemann Inc (Verlag)
978-0-12-802410-2 (ISBN)
Dr. Michael Gelles consults in security, intelligence, and law enforcement for Deloitte in Washington, D.C. and is a thought-leader on the security risks, asset exploitation, and workplace violence associated with insider threat. Dr. Gelles is a frequent lecturer and has written numerous articles and book chapters on organizational management, forensic psychology, law enforcement, terrorism, and counterintelligence.
Chapter 1: Introduction – A Leader’s GuideChapter 2: Challenges to Mature an Insider Threat ProgramChapter 3: From Bricks and Mortar to Bits and BytesChapter 4: Identifying Functional Ownership, Establishing the ITWG, and Developing CONOPs for Programmatic SuccessChapter 5: Identifying Critical Indicators in Organizational DataChapter 6: Establishing an Organizational Risk AppetiteChapter 7: Risk Management Using Data AnalyticsChapter 8: Information Security and Technology IntegrationChapter 9: Cyber Security and Insider Threat MitigationChapter 10: Vendor Analysis and Supply Chain Risk MitigationChapter 11: Employee Engagement: Critical to Mitigating the Risk of Insider ThreatChapter 12: Workplace Violence and Insider ThreatChapter 13: Monitoring and Investigating Chapter 14: Privacy and Data Considerations When Developing an Insider Threat ProgramChapter 15: What the Future HoldsAppendicesAppendix A: What data is needed to proactively identify potential insiders?Appendix B: Potential Risk IndicatorsAppendix C: How do I position an insider threat program to my workforce?Appendix D: What are the skill sets that a leading program needs to have?Appendix E: What capabilities differentiate an industry-leading program?Appendix F: Insider Threat Program Governance StructureAppendix G: Business Assurance/Insider Threat Working Group CharterAppendix H: How Do I Assess The Maturity of My Insider Threat Program?Appendix I: Business Rule DevelopmentAppendix J: How Do I Address Insider Threat From A Policy And Training Perspective?Appendix K: Use Case: E-Mail ExfiltrationAppendix L: FAQs
Verlagsort | Woburn |
---|---|
Sprache | englisch |
Maße | 191 x 235 mm |
Gewicht | 480 g |
Themenwelt | Wirtschaft ► Betriebswirtschaft / Management ► Personalwesen |
Wirtschaft ► Betriebswirtschaft / Management ► Unternehmensführung / Management | |
ISBN-10 | 0-12-802410-0 / 0128024100 |
ISBN-13 | 978-0-12-802410-2 / 9780128024102 |
Zustand | Neuware |
Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich