Appendix B. Deeper Dive into the Data
We are constantly mining the CERT insider threat database for new and useful information, sometimes to support specific research and development activities, sometimes based on curiosity, and sometimes at the request of someone outside of our team. Frequently when we hold workshops or give conference presentations we are asked new questions that we have not yet explored in the data. We often take those queries back with us, ask our database experts to find the answers, and provide the answers to the person who asked. We also try to incorporate those answers into posts on our blog,1 in our workshops, and in new publications if applicable. The purpose of this appendix is to provide some of those details to you, ...
Get The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.