Insiders are responsible for as much as 80 percent of malicious attacks. Because insiders are trusted by nature, detecting their illicit activities requires an array of monitoring, scanning, and other techniques. Roger Grimes, an InfoWorld contributing editor -- and a working security professional who tracks down unscrupulous insiders -- explains how to plan and execute a complete insider threat strategy.
In this Deep Dive special report, InfoWorld takes you through the three stages of dealing with insider threats:
Along the way, our expert covers the importance of event logs, data leak detection/prevention products, and honeypots, as well as new considerations stemming from the rise of cloud computing. Finally, you'll get a list of tools and techniques your business can adopt to stop insider threats before they begin.
Download the "Insider Threat Deep Dive Report" for all this info and more. It's hard enough fighting outside hackers and scammers who want to penetrate your company's security -- make sure you aren't battling destructive forces within your business as well.
InfoWorld has an abundance of security resources for the tech professional. Dig into InfoWorld's trove of real-world enterprise security knowledge:
- Roger A. Grimes covers hot-button security issues in the Security Adviser blog
- Get a handle on one of the most important industrywide computer standards in the PCI Compliance Deep Dive Report
- InfoWorld tells you how to identify and stop online threats in the Malware Deep Dive Report
- Subscribe to InfoWorld's Security Central newsletter for a rundown of security issues in the enterprise
Stay up on the latest security developments in InfoWorld's Security channel.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.