- NY Credits : 1.0
- TX Credits : 1.0
It is of critical importance for an entity to examine how an inside threat could harm an organization, both in the short term and extending into the future. Who in the entity has access to sensitive data that, if exposed or lost, could significantly disrupt or harm the organization's healthy operations? The potential population of insiders who may threaten the viability of a business can be quite extensive. Historically, insider threats were attributable to owners, executives, and management that violated company policy due to greed or power. This group of people had access but abused their authority. As the Internet and eCommerce became widely adopted for business, insider threats have been replaced with unauthorized insider access. In this course, we will examine history to identify the different types of insider threats to an organization.
Upon successful completion of this course, the user should be able to:
identify insider threats that have included executives, contractors, third-parties, fraud, and white-collar crime,
recognize the growth of cyber commerce and cyber-related insider threats, intellectual property theft, corporate espionage and identity theft, and
identify best practices to prevent and monitor insider threats with people, processes, and technology solutions.