Chapter 16. Insider Threat Questions and Answers

 

“If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.”

 
 --Bruce Schneier

Introduction

This chapter is based on questions from organizations that have deployed ESM. They have either deployed ESM with a focus on security, compliance, or both, and are now interested in also addressing insider threats. They are from a cross-industry, cross-geography composite of large enterprise and government organizations.

I’ve narrowed their questions to the ten most common. I didn’t stack ranked these; instead I followed a consistent methodology based on how an organization may think about the problem, from people and process requirements ...

Get Enemy at the Water Cooler now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.