We've conducted a piece of research with 500 IT decision makers in the UK and US to better understand their attitudes to insider threat, as well as how well set up they are to manage it.
Download the manifesto to understand more about:
- Where insider threats come in IT professionals' list of security priorities
- How prolific password sharing and internal security breaches are in US and UK businesses
- How some industry regulatory bodies seek to minimise insider threat, and how compliant businesses are with their own industry regulations
- What you can do to mitigate the risks from both a technological and cultural standpoint in your organisation
Drawing on the results of the research, this security manifesto hopes to empower IT professionals to take proactive measures to help them beat the threat from within.
While no system is ever going to 100% stop the problem, with the appropriate steps the risk can be significantly diminished.
Contents
- Where insider threats sit on the IT security agenda
- The Edward Snowden effect: is awareness of insider threats growing?
- Password Sharing and where the threat lies
- Active Directory and Insider Threats
- Network management and compliance
- Ten steps to beating insider threats
- Conclusion
