September 12, 2006
LONDON -- Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures (Syngress, September 2006) by Brian Contos is the definitive book for CIOs, CSOs and CEOs looking to battle the rising tide of security threats posed by their own trusted employees, consultants and partners. According to William P. Crowell, former Deputy Directory of the National Security Agency, "Brian Contos has created what few security specialists can claim: a truly readable book about the threats to our business from insiders ... Enemy at the Water Cooler is a must read for CIOs and security officers everywhere, but it is also part of the literature that CEOs and government leaders should read."
Enemy at the Water Cooler covers over a decade of the author's work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders. It explores organized crime, terrorist threats, hackers and activist groups. It then addresses the steps that organizations must take to address insider threats at a people, process and technology level.
Contos' book provides a new perspective to the growing concern over insider threats. Insider threats warrant being among the top concerns of IT professionals and businesses alike, but to date, there have been no other books that talk about the threat to businesses from insiders who know how to attack the critical components of modern business, the computers, applications and networks that make it all work.
"Insider threats are among the top concerns of IT professionals and businesses alike," said Amit Yoran, Information Security Expert and former National Cyber Security Director at the Department of Homeland Security. "The cyber crime overview, explanations of Enterprise Security Management countermeasures, and the wealth of real-life case studies contained in Contos' book explore this difficult problem with honest lessons learned, and it also describes some of the best practices derived from organizations around the world."
About the Author(s)
You May Also Like
Oct 2023 Threat Horizons Report
The New Frontier of Cyber Security: Securing the Network Edge
Best Practices for Modern Data Management in Banking: Compliance & Capital Without Compromise
Top 9 Traits You Need to Succeed as a Cybersecurity Leader
2022 Retrospective: The Emergence of the Next Generation of Wi-Fi