Government Agencies

 

 

https://sm.asisonline.org/Pages/Book-Review-Insider-Threats.aspxBook Review: Insider ThreatsGP0|#21788f65-8908-49e8-9957-45375db8bd4f;L0|#021788f65-8908-49e8-9957-45375db8bd4f|National Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652017-11-01T04:00:00Z<p>​Cornell University Press; cornellpress.cornell.edu; 216 pages; $89.95.</p><p>A collection of essays and case studies that originated in two workshops sponsored by the Global Nuclear Future Project of the American Academy of Arts and Sciences in 2011 and 2014, <em>Insider Threats</em> focuses on protecting the nuclear industry—but its lessons apply across many sectors.</p><p>The case studies are fascinating. A chapter devoted to the Fort Hood terrorist attack shows how changes in mission and procedures allowed information about the perpetrator to slip through the cracks. Instead of capturing warning signals, the systems scattered them. </p><p>Similar lessons were learned from the post–9/11 anthrax attacks in the United States. The author says that the suspect gained access to anthrax through “a complicated mix of evolving regulations, organizational culture, red flags ignored, and happenstance.”  </p><p>A real strength of this book is its root-cause analysis approach. Blame is rarely laid at the feet of incompetent people, but assigned to other factors like the unintended consequences of organizational design and known psychological tendencies. </p><p>The last chapter brings together all the lessons learned and cites 10 worst practices. For example, number seven is: “forget that insiders may know about security measures and how to work around them.” This chapter will be the most valuable to security practitioners because it offers a roadmap towards building an insider threat mitigation plan.</p><p><em>Insider Threats </em>is well-written, even literary. Its chief lesson: organizations are rarely designed to catch the insider, and much work needs to be done to protect them.</p><p><strong><em>Reviewer: Ross Johnson, CPP</em></strong><em>, is the senior manager of security and contingency planning for Capital Power, and infrastructure advisor for Awz Ventures. He previously worked as the security supervisor for an offshore oil drilling company in the Gulf of Mexico and overseas. Johnson is the author of Antiterrorism and Threat Response: Planning and Implementation.</em></p>

Government Agencies

 

 

https://sm.asisonline.org/Pages/Book-Review-Insider-Threats.aspx2017-11-01T04:00:00ZBook Review: Insider Threats
https://sm.asisonline.org/Pages/Security-Elections.aspx2017-11-01T04:00:00ZSecurity Elections
https://sm.asisonline.org/Pages/Slipping-Through-the-Cracks.aspx2017-11-01T04:00:00ZSlipping Through the Cracks
https://sm.asisonline.org/Pages/The-Zero-Day-Problem.aspx2017-11-01T04:00:00ZThe Zero Day Problem
https://sm.asisonline.org/Pages/Mobile-Mayhem.aspx2017-10-01T04:00:00ZMobile Mayhem
https://sm.asisonline.org/Pages/National-Security-Threats.aspx2017-09-27T04:00:00ZNational Security Threats
https://sm.asisonline.org/Pages/FBI-Director-Focused-on-Cyber-Threats.aspx2017-09-26T04:00:00ZFBI Director Focused on Cyber Threats
https://sm.asisonline.org/Pages/Partners-in-Crimestopping.aspx2017-09-01T04:00:00ZPartners in Crimestopping
https://sm.asisonline.org/Pages/Go-with-the-Flow.aspx2017-09-01T04:00:00ZGo with the Flow
https://sm.asisonline.org/Pages/FEMA,-CSOs-Assess-Dynamic-Situation-in-Houston.aspx2017-08-29T04:00:00ZFEMA, CSOs Assess Dynamic Situation in Houston
https://sm.asisonline.org/Pages/Interoperability-for-the-Safe-City-.aspx2017-08-21T04:00:00ZInteroperability for the Safe City
https://sm.asisonline.org/Pages/Former-Blackwater-Guard-Granted-A-New-Trial-In-Nisur-Massacre-Case-.aspx2017-08-04T04:00:00ZFormer Blackwater Guard Granted A New Trial In Nisur Massacre Case
https://sm.asisonline.org/Pages/In-the-Zone.aspx2017-08-01T04:00:00ZIn the Zone
https://sm.asisonline.org/Pages/Vulnerability-Rediscovery-Occurs-At-More-Than-Twice-The-Previously-Reported-Rate.aspx2017-07-21T04:00:00ZVulnerability Rediscovery Occurs At More Than Twice The Previously Reported Rate
https://sm.asisonline.org/Pages/DHS-Official-Says-Russia-Tried-to-Hack-21-States-in-2016-Election.aspx2017-06-21T04:00:00ZDHS Official Says Russia Tried to Hack 21 States in 2016 Election
https://sm.asisonline.org/Pages/EU-Needs-Comprehensive-Strategy-To-Address-Cybersecurity-Risks,-Think-Tank-Finds.aspx2017-06-09T04:00:00ZEU Needs Comprehensive Strategy To Address Cybersecurity Risks, Think Tank Finds
https://sm.asisonline.org/Pages/Power-Play---Resilience-and-Infrastructure.aspx2017-06-01T04:00:00ZPower Play: Resilience & Infrastructure
https://sm.asisonline.org/Pages/Book-Review---Resilience-in-Asia.aspx2017-06-01T04:00:00ZBook Review: Resilience in Asia
https://sm.asisonline.org/Pages/Trump’s-Cybersecurity-Executive-Order-Well-Received-by-Experts.aspx2017-05-12T04:00:00ZTrump’s Cybersecurity Executive Order Well Received by Experts
https://sm.asisonline.org/Pages/Solar-Technology-Can-Help-Secure-Military-Grids,-New-Paper-Finds.aspx2017-05-08T04:00:00ZSolar Technology Can Help Secure Military Grids, New Paper Finds

 You May Also Like...

 

 

National Securityhttps://sm.asisonline.org/national-security{198ff2c5-db82-48f1-a9b9-8e8950e165de}Your source for the latest security news.
Surveillancehttps://sm.asisonline.org/physical-security/surveillance{198ff2c5-db82-48f1-a9b9-8e8950e165de}Your source for the latest security news.
Physical Securityhttps://sm.asisonline.org/physical-security{198ff2c5-db82-48f1-a9b9-8e8950e165de}Your source for the latest security news.