VIDEO: The Evolving Insider Threat– Dawn Cappelli, Randy Trzeciak of CMU’s Insider Threat Center
This video from RSA Conference 2013 discusses:
- Who typically commits insider crimes – and how;
- How employees are being victimized from outside;
- Why our critical infrastructure is at heightened risk.
Even if you are an employer using standard commercial verification measures, you should be cautious about misuse of any information by employees, managers and contractors. Accordingly, you should be careful with training and education and not on only newly-hired employees. Further, plan on how login credential and access to sensitive information will be handled and/or turned over when training or when terminating, suspending, withholding pay, lowering pay, or taking any other adverse action against an employee.
Like this:
Like Loading...
Published by David
I am a the founder of a boutique intellectual property law firm based in Chicago, Illinois. In my role as a trusted advisor, I act as the primary transactional attorney for my clients, reporting directly to a company’s executive staff and/or its General Counsel. I provide advice to business units and executives on copyright, trademark, ecommerce, software/IT, media & entertainment and issues associated with creating and commercializing innovations and creative content, drafting and negotiating contracts and licenses, advising on securities laws and corporate governance and managing outside counsel. My clients frequently rely on me to successfully draft and negotiate complex commercial and intellectual property transactions such as supply/distribution agreements, IP development and license agreements and documentation related to mergers, acquisitions and divestitures.
View all posts by David