Walling Out the Insiders: Controlling Access to Improve Organizational Security

Walling Out the Insiders: Controlling Access to Improve Organizational Security

by Michael Erbschloe
Walling Out the Insiders: Controlling Access to Improve Organizational Security

Walling Out the Insiders: Controlling Access to Improve Organizational Security

by Michael Erbschloe

eBook

$71.49  $94.95 Save 25% Current price is $71.49, Original price is $94.95. You Save 25%.

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an organization culture where security concerns are inherent in all aspects of organization development and management. While there is not a single one-size-fits-all security program that will suddenly make your organization more secure, this book provides security professionals and non-security managers with an approach to protecting their organizations from insider threats.


Product Details

ISBN-13: 9781315402642
Publisher: CRC Press
Publication date: 02/24/2017
Sold by: Barnes & Noble
Format: eBook
Pages: 372
File size: 2 MB

About the Author

Michael Erbschloe

Table of Contents

1. Introduction: How This Book Will Help to Build a Security Philosophy and Strategy. 2. Identifying What to Protect and Who to Protect It from. 3. Developing a Plan to Improve Security and Reduce the Insider Threat. 4. Increasing Awareness, Diligence, and Vigilance. 5. Developing Policies and Training Employees. 6. Evaluating Security Services and Security Products. 7. Establishing an Identification Program for Employees, Business Partners, Customers, and Other Visitors. 8. Implementing Strong Access Controls. 9. Managing Relationships with Vendors, Business Partners, and Customers. 10. Developing Methods to Monitor Security Threats and Needs. 11. Investigating and Responding to Security Incidents.12. Using Surveillance Technologies and Techniques. 13. What to Do When Hiring New Employees. 14. Conducting Periodic Reviews of Security and Threats.

From the B&N Reads Blog

Customer Reviews