Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks
• Presentation
In this presentation, the authors describe different types of insider crime and best practices for mitigating that crime.
Publisher
Software Engineering Institute