From the course: Insider Threat Risk Management

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Conducting risk assessments

Conducting risk assessments

- When driving a car, you make sure you wear a seatbelt. This reduces the effect of a potential crash. In the same way when doing business, you make sure you reduce the level of risks brought in by the business. As I mentioned in the last video, the three steps that are part of your insider threat program are initiation, planning, and operations. Once you have the initiation step and received leadership buy-in, the next step is to plan and focus on your risk management process. Step one involves identifying assets, assessing risks, and mitigating them. Start by identifying your critical assets and owners in your risk management process. For example, intellectual property is your critical asset. Identify the owners of this information and the systems in which the information resides. Once you have identified your critical asset, you need to identify indicators that could signal a potential compromise to your system from an…

Contents