O'Reilly logo

The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) by Randall F. Trzeciak, Andrew P. Moore, Dawn M. Cappelli

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix E. Insider Threat Training Simulation: MERIT InterActive

While it has long been understood that quality training is imperative to organizational success, traditional training techniques do not necessarily result in significant job-performance improvement because of the difficulty of effectively capturing the reality of complex challenges and changing priorities that organizations face. Training on subjects in such complex domains as insider threat is often difficult to design because it requires a balance of people, processes, and technology. We have faced the difficulty of transitioning complex lessons about insider threat to an audience that might prefer to focus on individual aspects of the problem, rather than the “big picture.” ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required