Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.
September 12, 2006
2 Min Read
LONDON -- Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures (Syngress, September 2006) by Brian Contos is the definitive book for CIOs, CSOs and CEOs looking to battle the rising tide of security threats posed by their own trusted employees, consultants and partners. According to William P. Crowell, former Deputy Directory of the National Security Agency, "Brian Contos has created what few security specialists can claim: a truly readable book about the threats to our business from insiders ... Enemy at the Water Cooler is a must read for CIOs and security officers everywhere, but it is also part of the literature that CEOs and government leaders should read."
Enemy at the Water Cooler covers over a decade of the author's work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders. It explores organized crime, terrorist threats, hackers and activist groups. It then addresses the steps that organizations must take to address insider threats at a people, process and technology level.
Contos' book provides a new perspective to the growing concern over insider threats. Insider threats warrant being among the top concerns of IT professionals and businesses alike, but to date, there have been no other books that talk about the threat to businesses from insiders who know how to attack the critical components of modern business, the computers, applications and networks that make it all work.
"Insider threats are among the top concerns of IT professionals and businesses alike," said Amit Yoran, Information Security Expert and former National Cyber Security Director at the Department of Homeland Security. "The cyber crime overview, explanations of Enterprise Security Management countermeasures, and the wealth of real-life case studies contained in Contos' book explore this difficult problem with honest lessons learned, and it also describes some of the best practices derived from organizations around the world."
You May Also Like
10 Considerations to Building Hybrid Mesh Firewall
Hybrid Mesh Firewall: An Essential Solution for Today's Distributed Enterprise
*State of ITSM in Retail
A revolution in healthcare IT service management: How automation is driving improvements in a complex environment
Checklist: Top 6 Considerations to Optimize Your Digital Acceleration Security Spend