This site uses cookies to provide you with a more responsive and personalised service. By using this site you agree to our use of cookies. Please read our cookie notice for more information on the cookies we use and how to delete or block them.
The full functionality of our site is not supported on your browser version, or you may have 'compatibility mode' selected. Please turn off compatibility mode, upgrade your browser to at least Internet Explorer 9, or try using another browser such as Google Chrome or Mozilla Firefox.

CFO Insights — Unmasking insider threats

Published on: May 07, 2015

As workplaces become more complex and insider threats become more difficult to detect, a program to mitigate those threats can bolster deterrence by providing an early-detection and response mechanism.

Moreover, by viewing insider-threat mitigation more broadly than as a cybersecurity challenge, CFOs — working with their CIOs — can help assure the business, protect employees, and safeguard critical data, systems, and facilities.

This issue outlines actions to consider when designing, building, and implementing a formal insider-threat mitigation program.


Related Topics

Correction list for hyphenation

These words serve as exceptions. Once entered, they are only hyphenated at the specified hyphenation points. Each word should be on a separate line.