This resource is no longer available
Given their inherent access, detecting and preventing a malicious insider who appears to be conducting fully authorized activity is challenging at best.
This white paper highlights effective countermeasures that US federal government agencies can put in place to combat insider threats, such as:
- Providing more granular levels access to critical systems & apps
- Managing authentication
- Monitoring all privileged access activity
Read on to learn more about this risk-based approach to preventing insider threats.