Insider Threats
- Analyze the current state of insider threats to computer systems and infrastructure in terms of numbers, costs and potential problems.
- What are the various profiles of insiders who may compromise your systems?
- What methods can companies take to thwart insider threats? (Think of methods such as personnel checks, monitoring access, risk management services, suspicious activity, etc).
800 words