October 2006
Intermediate to advanced
304 pages
5h 47m
English
“If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.” | ||
| --Bruce Schneier | ||
This chapter is based on questions from organizations that have deployed ESM. They have either deployed ESM with a focus on security, compliance, or both, and are now interested in also addressing insider threats. They are from a cross-industry, cross-geography composite of large enterprise and government organizations.
I’ve narrowed their questions to the ten most common. I didn’t stack ranked these; instead I followed a consistent methodology based on how an organization may think about the problem, from people and process requirements ...