Insiders are responsible for as much as 80% of malicious attacks. Because insiders are trusted by nature, detecting their illicit activities requires an array of monitoring, scanning, and other techniques. Roger Grimes, an InfoWorld contributing editor -- and a working security professional who tracks down unscrupulous insiders -- explains how to plan and execute a complete insider threat strategy.
In this Deep Dive special report, InfoWorld takes you through the three stages of dealing with insider threats:
Along the way, our expert covers the importance of event logs, data leak detection/prevention products, and honeypots, as well as new considerations stemming from the rise of cloud computing. Finally, you'll get a list of tools and techniques your business can adopt to stop insider threats before they begin.