search menu icon-carat-right cmu-wordmark

Archive: March 2020

Functional Requirements for Insider Threat Tool Testing

Functional Requirements for Insider Threat Tool Testing

• Insider Threat Blog
Robert M. Ditmore

Derrick Spooner co-authored this post. Because of the scope and scale of the insider threat, the SEI recommends that organizations adopt a use-case-based approach to insider risk mitigation. In such an approach, organizations iteratively deploy capabilities to prevent, detect, and respond to the greatest threats to their most critical assets. However, the tools modern insider threat programs rely on to collect and analyze data do not adapt themselves to the organization or its changing insider...

Read More