In 2017, The Insider Threat Epidemic Begins
Just as American and European critical infrastructure executives were beginning to wrap their minds around the devastation of the Office of Personnel Management breach, ransomware erupted onto the scene, followed by concentrated DDoS attacks such as the Mirai botnet attack on Dyn, which enabled a quantum leap for cyber criminals. Now, all techno-forensic indicators suggest that an under-discussed cyber-kinetic attack vector will ubiquitously permeate all critical infrastructure sectors due to a dearth of layered bleeding-edge military grade cybersecurity solutions. Unless organizations act immediately, in 2017 The Insider Threat Epidemic Begins.
In this brief, entitled “In 2017, The Insider Threat Epidemic Begins” the Institute for Critical Infrastructure Technology offers a comprehensive analysis of the Insider Threat Epidemic, including research on:
Characterizing Insider Threats (the insider threat cyber ‘kill chain,’ non-malicious insider threats, malicious insider threats)
The Insider Threat Debate
Policies, Procedures, and Guidelines to Combat Insider Threats
Non-Technical Controls
Technical Controls
Original Source : http://icitech.org/icit-brief-in-2017-the-insider-threat-epidemic-begins/
Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:
http://icitech.org/icit-brief-in-2017-the-insider-threat-epidemic-begins/
Copying/Pasting full texts without adding anything original is frowned upon by the community.
Some tips to share content and add value:
Repeated copy/paste posts could be considered spam. Spam is discouraged by the community, and may result in action from the cheetah bot.
Creative Commons: If you are posting content under a Creative Commons license, please attribute and link according to the specific license. If you are posting content under CC0 or Public Domain please consider noting that at the end of your post.
If you are actually the original author, please do reply to let us know!
Thank You!