Training

Fraud Management & Cybercrime

Insider Threat: 3 Faces of Risk

Insider Threat: 3 Faces of Risk

IT sabotage. Intellectual property theft. Employee fraud. These are the three most common insider threats to organizations. But what are the successful solutions for detecting and preventing these crimes? Register for this session to hear first-hand from leading researchers and authors Dawn Cappelli and Randy Trzeciak, as well as security expert and author Christine Meyers:

See Also: The Application Security Team's Framework For Upgrading Legacy Applications

  • What motivates insiders to commit crimes;
  • Most common methods of attack;
  • Solutions you can use to stop these incidents before they cause damage.

Background

The insider threat: It's a top challenge for any organization, and it's one that Dawn Cappelli and Randy Trzeciak have studied for over a decade.

Cappelli and Trzeciak are both leaders with the CERT Program at Carnegie Mellon University's Software Engineering Institute, and they are the author of a new book, The CERT Guide to Insider Threats.

In their work, these researchers have uncovered the three most common types of insider crimes:

IT Sabotage: An insider's use of IT to direct specific harm at an organization or an individual. Common crimes: Deletion of information; bringing down systems; web site defacement to embarrass an organization.

Theft of Intellectual Property: An insider's use of IT to steal intellectual property from the organization. This category includes industrial espionage involving insiders, and among the criminals' targets: Proprietary engineering designs, scientific formulas; source code; confidential customer information.

Fraud: An insider's use of IT for the unauthorized modification, addition or deletion of an organization's data (not programs or systems) for personal gain, or theft of information that leads to fraud (identity theft, credit card fraud). Typical crimes: Theft and sale of confidential information (SSN, credit card numbers, etc.); modification of critical data for pay (driver's license records, criminal records, welfare status); stealing of money (financial institutions, government organizations).

In this session, Cappelli and Trzeciak will discuss each of these models of insider crimes, including case studies that detail potential indicators that your organization is at risk.

They will be joined by Christine Meyers, Director of Attachmate's Enterprise Fraud Management solutions, and overseer of the Luminet product. She will discuss security controls that will help detect and prevent these costly insider crimes. She will also provide a 6 step guide to reducing risk across the enterprise.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.