{"product_id":"insider-threat-a-guide-to-understanding-detecting-and-defending-against-the-enemy-from-within-paperback","title":"Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within - Paperback","description":"\u003cdiv\u003e\u003cp style=\"text-align: right;\"\u003e\u003ca href=\"https:\/\/reportcopyrightinfringement.com\/\" target=\"_blank\" rel=\"nofollow\"\u003e\u003cb\u003eReport copyright infringement\u003c\/b\u003e\u003c\/a\u003e\u003c\/p\u003e\u003c\/div\u003e\u003cp\u003eby \u003cb\u003eJulie E. Mehan\u003c\/b\u003e (Author)\u003c\/p\u003e\u003cp\u003e\u003c\/p\u003e\u003cp\u003eEvery type of organisation is vulnerable to insider abuse, errors or malicious attacks. These can impact reputation, operations and profitability, and expose data, harm the organisation, or deliver valuable intellectual property into competitors' hands.\u003c\/p\u003e \u003cp\u003eInsiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems or data, and all of them can bypass security measures through legitimate means.\u003c\/p\u003e \u003cp\u003e\u003cstrong\u003eProduct overview\u003c\/strong\u003e\u003c\/p\u003e \u003cp\u003e\u003cem\u003eInsider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Within\u003c\/em\u003e looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security.\u003c\/p\u003e \u003cp\u003eIt also provides some short-term quick fixes that can be applied as your organisations builds an effective insider threat programme.\u003c\/p\u003e \u003cp\u003eRead this book to learn: \u003c\/p\u003e \u003cul\u003e \u003cli\u003eThe seven organisational characteristics common to insider threat victims.\u003c\/li\u003e \u003cli\u003eThe ten stages of a malicious attack.\u003c\/li\u003e \u003cli\u003eThe ten steps of a successful insider threat programme.\u003c\/li\u003e \u003cli\u003eHow to construct a three-tier security culture, encompassing artefacts, values and shared assumptions.\u003c\/li\u003e \u003c\/ul\u003e \u003cp\u003e\u003cem\u003eInsider Threat\u003c\/em\u003e details the measures that organisations can implement to ensure high-impact quick wins, mapping appropriate security controls from the ISO 27001, ISO 27002, and NIST SP 800-53 standards to the following points, and more: \u003c\/p\u003e \u003cul\u003e \u003cli\u003eRisk mitigation and the eight steps of a risk assessment\u003c\/li\u003e \u003cli\u003eThe importance of training and awareness, and conducting staff background screening\u003c\/li\u003e \u003cli\u003eMonitoring and auditing the activities of general and privileged users, and quickly responding to suspicious behaviours\u003c\/li\u003e \u003cli\u003eMetrics to measure insider threat behaviour and mitigation\u003c\/li\u003e \u003cli\u003eThe challenge of external or temporary insiders (such as consultants, support contractors, partners, service providers, temporary employees)\u003c\/li\u003e \u003cli\u003eLayering physical and digital defences to provide defence in depth\u003c\/li\u003e \u003cli\u003eThe importance of conducting regular penetration testing to evaluate security controls\u003c\/li\u003e \u003cli\u003eLimiting, monitoring and controlling remote access and mobile device use\u003c\/li\u003e \u003cli\u003eEnsuring supply-chain security\u003c\/li\u003e \u003cli\u003eMaintaining an incident management capability\u003c\/li\u003e \u003c\/ul\u003e \u003cp\u003eIt also sets out what not to do, listing a set of worst practices that should be avoided.\u003c\/p\u003e \u003cp\u003e\u003cstrong\u003eThe insider threat comes in many forms. Insider Threat is the most in-depth guide to help you prepare for them. Order your copy today.\u003c\/strong\u003e\u003c\/p\u003e \u003cp\u003e\u003cstrong\u003eAbout the author\u003c\/strong\u003e\u003c\/p\u003e \u003cp\u003eDr Julie Mehan is the founder and president of JEMStone Strategies and a principal in a strategic consulting firm in Virginia. She has delivered cyber security and related privacy services to senior commercial, Department of Defense and federal government clients working in Italy, Australia, Canada, Belgium and the United States. Dr Mehan is also an associate professor at the University of Maryland University College, specialising in courses in cybersecurity, cyberterror, IT in organisations, and ethics in an Internet society.\u003c\/p\u003e\u003ch3\u003eAuthor Biography\u003c\/h3\u003e\u003cp\u003eDr Julie Mehan is the founder and president of JEMStone Strategies and a principal in a strategic consulting firm in Virginia. She has delivered cyber security and related privacy services to senior commercial, Department of Defense and federal government clients working in Italy, Australia, Canada, Belgium and the United States. Dr Mehan is also an associate professor at the University of Maryland University College, specialising in courses in cybersecurity, cyberterror, IT in organisations, and ethics in an Internet society.\u003c\/p\u003e\n            \u003cdiv\u003e\n\u003cstrong\u003eNumber of Pages:\u003c\/strong\u003e 312\u003c\/div\u003e\n            \u003cdiv\u003e\n\u003cstrong\u003eDimensions:\u003c\/strong\u003e 0.66 x 8.5 x 5.5 IN\u003c\/div\u003e\n            \u003cdiv\u003e\n\u003cstrong\u003ePublication Date:\u003c\/strong\u003e September 20, 2016\u003c\/div\u003e\n            ","brand":"BooksCloud","offers":[{"title":"Default Title","offer_id":52487137198387,"sku":"9781849288392","price":83.93,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0300\/5595\/6612\/files\/dgpGGGc5Vv9781849288392.webp?v=1759841592","url":"https:\/\/www.vysn.com\/products\/insider-threat-a-guide-to-understanding-detecting-and-defending-against-the-enemy-from-within-paperback","provider":"VYSN","version":"1.0","type":"link"}