Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks

Keywords Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks Software Engineering Institute
Standards groups

Current or former employee, contractor, or other business partner who
has or had authorized access to an organization’s network, system or data and
intentionally exceeded or misused that access in a manner that
negatively affected the confidentiality, integrity, or availability of the organization’s information or information systems.

Metadata
Date published
2011-09-22
Document type
Presentation
Pages
24
Defines standard
Replaced/Superseded by document(s)
Cancelled by
Amended by
File MIME type Size (KB) Language Download
2011-09-22 Insider threat presentation.pdf application/pdf   1.52 MB English DOWNLOAD!
File attachments
Cover images
Organisation(s)
Author(s)
Dawn Cappelli
Visit also
External links