Leveraging Existing IT Resources for Insider Threat Risk Mitigation
[Technical Report, Other]
Carnegie Mellon University Software Engineering Institute
Pagination or Media Count:
Detecting observable indicators of insider risk relies heavily on collection and analysis of specific types of data representing user activity on enterprise systems. Some organizations deploy user activity monitoring UAM software specifically for this purpose, but others are unable to do so, either for cost reasons, lack of support resources, etc. Here, we demonstrate how organizations may leverage existing IT resources to provide meaningful data for insider threat risk mitigation without deploying a stand alone UAM solution.
- Computer Systems Management and Standards