Ever since people first betrayed the trust placed in them, insiders have posed a threat. From Brutus in Roman times to Volkswagen more recently, and for high-profile individuals such as Edward Snowden to busy staff who misaddress emails, examples abound So why is the insider threat receiving so much attention?

This briefing paper equips ISF Members to combat the insider threat by:

  • broadening the discussion to three types of risky insider behaviour: malicious, negligent and accidental
  • describing the importance of trust and the central role it plays extending technical and management controls
  • suggesting actions for immediate results and additional actions to sustain those results.

 

Briefing Paper

Managing the Insider Threat: Improving Trustworthiness -ISF Briefing Paper

Please fill out the form below to download a complimentary Briefing Paper.

Please provide your details to download this document:

The Information Security Forum (ISF) is a data controller for the personal data collected on this website.

For information on how we collect and use your personal data, please read our Privacy Notice.

Please read and agree with our Terms Of Use.

From time to time, the ISF would like to contact you regarding our latest products, services and events.

By ticking the relevant boxes below, please indicate your preferences on how you want to be contacted:

You can update your preferences at any time, or withdraw consent after submission by going to the ‘Already Registered’ tab.

Please enter the email address you previously registered with to access the download:

You have previously downloaded from our website. For more information on how we use your personal information, please see our Privacy Notice.

Please refamiliarise yourself with our Terms Of Use.

To update your preferences on how you would like to be contacted by the ISF, please indicate below:

To unsubscribe from all ISF communications. Click here: