Insider Threats: Avoiding the Next Snowden
Streaming video - 2015
Not since the days of Daniel Ellsberg and the Pentagon Papers have we seen the likes of a classified material leak of the size and significance executed by the now infamous NSA contractor, Eric Snowden. This devastating loss of sensitive information has served as yet another wake-up call to organizations both public and private to tighten up their data security policies and protocols in an effort to lessen the chance of a repeat performance. In this program expert Kevin Jones, Senior Information Security Engineer for Thycotic Software, discusses the critical nature of Insider Threats today. In addition he offers advice and best practices that will help IT and business leaders reduce the risk of an insider compromising private organizational... data and information. After successfully completing this segment you should be able to: Identify Insider Threats and the IT trends that may be making organizations more vulnerable to them Recognize the characteristics of an insider who threatens IT security Understand the approach organizations should take in order to effectively monitor and detect Insider Threats today Discuss threat detection methods that will be available in the future.
- Subjects
- Published
-
[San Francisco, California, USA] :
Kanopy Streaming
2015.
- Language
- Undetermined
- Corporate Author
- Corporate Author
- Online Access
- A Kanopy streaming video
Cover Image - Item Description
- Title from title frames.
In Process Record. - Physical Description
- 1 online resource (streaming video file)
- Playing Time
- Du:ra:ti
- Format
- Mode of access: World Wide Web.
- Access
- AVAILABLE FOR USE ONLY BY IOWA CITY AND RESIDENTS OF THE CONTRACTING GOVERNMENTS OF JOHNSON COUNTY, UNIVERSITY HEIGHTS, HILLS, AND LONE TREE (IA).