Segments in this Video

Introduction - Insider Threats: Avoiding the Next Snowden (01:53)


Edward Snowden stole approximately 1.7 million files. This video features Kevin Jones and is intended to inform professionals on insider threats. This segment orients viewers to the topics that will be covered in this video including current trends, characteristics, monitoring, and detecting these criminals.

Insider Threats Today (05:15)

Most corporations handle insider crime cases in-house and do not involve law enforcement or take legal action. Jones describes how cloud computing has changed the way corporations store data. Insider threats include disgruntled employees, service providers you trust your data to, and not focusing on potential scenarios.

Characteristics of an Insider (03:51)

Half of IT Managers surveyed described how privileged user accounts were shared. BYOD creates increased risks. Characteristics include a disgruntled employee, financial reasons, and whistleblowers.

Monitoring and Detecting Insider Crime (05:20)

Protect systems and data by ensuring users follow privilege practices, access only what is essential; corporations should have checks and balances in place and establish a behavioral baseline. Monitor management systems and security vaults. Jones recommends enforcing written IT policies.

Cloud Computing Risks (05:05)

Jones recommends asking who has access to resources, what the vendor's policies are, and what guarantees can they make. Employ threat detection programs like risk assessments on employees. Best practices include knowing your employees, making sure accounts are shut off immediately after a dismissal, and examining bad behavior patterns.

Conclusion - Insider Threats: Avoiding the Next Snowden (06:27)

Jones discusses updates on the Heartbleed Bug and how to combat it. Examine disgruntled employees and those who have information they do not realize is sensitive. Emerging trends include behavior analytics.

For additional digital leasing and purchase options contact a media consultant at 800-257-5126
(press option 3) or

Insider Threats: Avoiding the Next Snowden

Part of the Series : Exploring Enterprise Security and Risk Management
DVD (Chaptered) Price: $149.95
DVD + 3-Year Streaming Price: $224.93
3-Year Streaming Price: $149.95



Not since the days of Daniel Ellsberg and the Pentagon Papers have we seen the likes of a classified material leak of the size and significance executed by the now infamous NSA contractor, Eric Snowden. This devastating loss of sensitive information has served as yet another wake-up call to organizations both public and private to tighten up their data security policies and protocols in an effort to lessen the chance of a repeat performance. In this program expert Kevin Jones, Senior Information Security Engineer for Thycotic Software, discusses the critical nature of Insider Threats today. In addition he offers advice and best practices that will help IT and business leaders reduce the risk of an insider compromising private organizational data and information. After successfully completing this segment, you should be able to: identify Insider Threats and the IT trends that may be making organizations more vulnerable to them, recognize the characteristics of an insider who threatens IT security, understand the approach organizations should take in order to effectively monitor and detect Insider Threats today, and discuss threat detection methods that will be available in the future.

Length: 28 minutes

Item#: BVL146019

Copyright date: ©2015

Closed Captioned

Performance Rights

Prices include public performance rights.

Not available to Home Video, Dealer and Publisher customers.