CHAPTER 7: FINAL THOUGHTS

When eating an elephant take one bite at a time.* Creighton Adams148

This book can only provide a beginning to addressing insider threat. This is a problem that will continue to evolve as technologies increase both the amount of data available and the access to that data. In order to be effective, we need to understand the insider ‘gone bad’ and capitalize on the outcomes of continuing research, such as that being done by CMU SEI in the US and the CPNI in the UK.

If there is only one conceptual take-away from this book, it is that the insider threat comes in diverse and complex forms, that those involved can have a multitude of motives, and that the common, often unknown or undetected, organizational flaws make the ...

Get Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.