Welcome to our new site version. Your web page bookmarks may have changed, please search for pages by title to update them. Having problems ? Please try clearing your web browser cache and hard-reloading your web page first before contacting our webmaster.

Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks

[document] Submitted on 1 July, 2019 - 15:17
Keywords Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks Software Engineering Institute
Standards groups

Current or former employee, contractor, or other business partner who
has or had authorized access to an organization’s network, system or data and
intentionally exceeded or misused that access in a manner that
negatively affected the confidentiality, integrity, or availability of the organization’s information or information systems.

Metadata
Date published
2011-09-22
Document type
Presentation
Pages
24
Replaced/Superseded by document(s)
Cancelled by
Amended by
File MIME type Size (KB) Language Download
2011-09-22 Insider threat presentation.pdf application/pdf   1.52 MB English DOWNLOAD!
File attachments
Cover images
Organisation(s)
Author(s)
Dawn Cappelli
Defines standard
Visit also
External links