Walling Out the Insiders: Controlling Access to Improve Organizational Security, 1st Edition (Paperback) book cover

Walling Out the Insiders

Controlling Access to Improve Organizational Security, 1st Edition

By Michael Erbschloe

Auerbach Publications

348 pages | 25 B/W Illus.

Purchasing Options:$ = USD
Paperback: 9781138031609
pub: 2017-02-23
SAVE ~$17.39
eBook (VitalSource) : 9781315402666
pub: 2017-02-24
from $41.98

FREE Standard Shipping!


Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an organization culture where security concerns are inherent in all aspects of organization development and management. While there is not a single one-size-fits-all security program that will suddenly make your organization more secure, this book provides security professionals and non-security managers with an approach to protecting their organizations from insider threats.

Table of Contents

1. Introduction: How This Book Will Help to Build a Security Philosophy and Strategy. 2. Identifying What to Protect and Who to Protect It from. 3. Developing a Plan to Improve Security and Reduce the Insider Threat. 4. Increasing Awareness, Diligence, and Vigilance. 5. Developing Policies and Training Employees. 6. Evaluating Security Services and Security Products. 7. Establishing an Identification Program for Employees, Business Partners, Customers, and Other Visitors. 8. Implementing Strong Access Controls. 9. Managing Relationships with Vendors, Business Partners, and Customers. 10. Developing Methods to Monitor Security Threats and Needs. 11. Investigating and Responding to Security Incidents.12. Using Surveillance Technologies and Techniques. 13. What to Do When Hiring New Employees. 14. Conducting Periodic Reviews of Security and Threats.

Subject Categories

BISAC Subject Codes/Headings:
COMPUTERS / Information Technology
COMPUTERS / Security / General