Insider Threats Part II: Current and Recommended Strategies to Mitigate Insider Threats

The first blog in this series presented information about Insider Threat policies and key organizations working to prevent Insider Threats.  This blog will focus on current, IT-based, and recommended, whole-person risk-rating, efforts to detect and prevent Insider Threats.  The next blog post w

Weekly Roundup: October 16-20, 2017

John Kamensky

Weekly Roundup: October 16-20, 2017

John Kamensky

Weekly Roundup: October 16-20, 2017

John Kamensky

Call for Research Report Proposals 2017

Leaders who understand and can leverage effective management tools and practices are better prepared to execute on their priorities and see measurable, positive program results. The IBM Center for The Business of Government is committed to helping identify and distill the lessons learned from the past, identify current and new management initiatives and capacities that will be needed to address key challenges facing the country in this administration, and offer ideas on implementation.

Managing Advanced Threats in the Digital Age: Addressing security, risk and compliance for U.S. Public Sector executives

These attacks are relentless, aggressive and constantly evolving, and have clearly shown that federal agencies and organizations are struggling in managing security threats, despite the stricter security protocols that are often in place at government agencies. Cyber threats are “among the most urgent dangers to America’s economic and national security,” President Obama was quoted as saying in a Wall Street Journal article in 2015.

Defining a Framework for Decision Making in Cyberspace

This report is the product of a group of experts, which was convened by the Department of Computer Science at the Indiana University of Pennsylvania (IUP). IUP brought together an interdisciplinary panel of experts in national security, international relations, foreign policy, information system network and security, public policy, and computer science. These experts participated in two collaborative roundtable meetings during the first six months of 2014.

A Best Practices Guide to Information Security

Organizations take great pains to use technology to defend against outside attacks; they work hard to spot and stop the malicious insider who is willfully trying to do ill to systems. However, most organizations fall short in equipping their workers with best practices to make them part of the solution to information security.

Pages

Your cart

Your cart is empty.