Randy Trzeciak discusses how to determine an organization's vulnerability to insider threats.
Publisher
Software Engineering Institute
Watch
Abstract
Trzeciak lists nine units that should be considered during the vulnerability assessment process and encourages organizations who need assistance to start addressing insider threats to contact the Insider Threat Center at CERT.