O'Reilly logo

The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) by Randall F. Trzeciak, Andrew P. Moore, Dawn M. Cappelli

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix C. CyberSecurity Watch Survey

To properly allocate information security resources and budgets, organizations need to know the prevalence of insider threat, especially as compared to outsider threat.

In 2004 we decided that we should develop another method for measuring the prevalence of malicious insider incidents across the United States. Therefore, we partnered with CSO Magazine and the Secret Service to conduct the first annual CyberSecurity Watch Survey. The survey has been a successful method for gathering information regarding electronic crimes, techniques, best practices, and emerging trends; therefore, we have continued to conduct the survey on an annual basis1 [CSO 2011a].

The survey is sent out annually to CSO Magazine readers ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required