Management awareness paper on insider threat metrics
How do you measure 'insider threats' in your organization? If your answer is "We don't!", then I have to wonder how you are managing insider threats. Without suitable metrics, how do you figure out how much of a problem you might have from employees, contractors, consultants, temps and interns? How do you determine where best to spend your security budget? How do you persuade management to loosen the purse strings sufficiently to address the risks? I guess you guess! The discussion paper breaks down 'insider threat' into chunks that can be measured sensibly. The main divide falls between deliberate attacks (such as frauds by insiders) and accidents (such as mistakenly overwriting the entire production database - don't laugh, it happened to me 25 years ago and the nightmare still haunts me today!). The paper picks up on one of the most productive sources of information security metrics: the IT Help/Service Desk's problem and incident manage...