Threats from trusted employees, partners, consultants and the like continue to be an issue across every business. Because insiders have things outsiders don’t, like trust and access, they are able to operate with greater stealth and ease – and cause greater damage in a shorter amount of time. While there are two categories of insiders, Read more…
Tags: Insider Threats, Security Connected Reference Architecture
The EC-Council will host a gathering of public/private sector information security executives and thought-leaders at the CISO Executive Summit 2011 on December 5-6 in Las Vegas. The agenda features panel discussions addressing issues that emerge from the intersection between technology, people, and business. Below are three panels on which I was asked to contribute my Read more…
Posts tagged under Insider Threats