Preface
An enemy launching a frontal attack can be anticipated and repulsed. An adversary who attacks from within, however, is not so readily countered. This book began as a study seekingto identify defenses against trust betrayers who were targeting critical infrastructure. It then evolved into a thesis that earned top writing honors at the Naval Postgraduate School1 and into a subsequent article in the peer-reviewed journal Homeland Security Affairs.2 Bolstered by further research commissioned by a professional security industry association, the work next migrated into an industry research report, Tackling the Insider Threat,3 samplings of which reappear in this book in Chapter 10 in edited form, with the permission of the ASIS Foundation. ...
Get Managing the Insider Threat now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.