Star 0

Abstract

Combating insider threats is daunting, even more challenging is to unearth and defend crimes committed by organized malicious insiders enjoying a high degree of trust. Programs to mitigate malicious insider threats effectively can be complicated and costly. The presentation defines the types of insider threat and concludes with a 10-step program to reinforce organizations’ capability to combat it.