Inside IT: Mitigating Insider Threats

May 7th, 2012 |
Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The audio player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, Other


 
The audio player code can be used without the image as follows:


 
This audio file can be linked to by copying the following URL:


 
Download the audio file.
 
Subscribe:
Connected Social Media - iTunes | Spotify | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Inside IT - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

IT Best Practices: Episode 24 – Employee theft is not a new problem. It does, however, have new dimensions to it in this era of data sophistication. And insider incidents have taken on new prominence in the public consciousness as the result of some high-profile incidents like the WikiLeaks case. In this podcast we look at mitigating insider threats with Grant Babb, Proactive Investigations Program Manager with Intel IT. He tells about the wake-up call Intel got, and how Intel IT developed a program of proactive monitoring to minimize the threat.


For more information on Intel IT Best Practices, please visit intel.com/IT

Tags: , , , , , , , , , , , , , , ,
 
Posted in: Audio Podcast, Inside IT, Intel, Intel IT, IT@Intel, Security
 


 


Learn more with Intel IT’s expert on Cyber Risk Management, Tim Casey on:
Intel.com, LinkedIn, or follow him on Twitter.


Learn more about IT Business Value from Paula Tolliver, Intel CIO on:
Intel.com, LinkedIn, or follow her on Twitter.