Governance & Risk Management , Incident & Breach Response , Insider Threat

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

Randy Trzeciak of Carnegie Mellon University's CERT describes the latest edition of the group's common sense guide to mitigating insider threats and offers an update on his latest research.

See Also: Core Elements of Modern Workforce Identity Security

In a video interview at RSA Conference 2017, Trzeciak:

  • Highlights changes in the new common sense guide;
  • Discusses how the insider threat dialogue has changed in recent years;
  • Identifies the toughest challenges involved in detecting and mitigating the insider threat.

Trzeciak is the insider threat research team technical lead in the Software Engineering Institute at Carnegie Mellon University's CERT. He heads a team focusing on insider threat research; threat analysis and modeling; assessments; and training. He has over 20 years of experience in software engineering; database design, development and maintenance; project management; and information security. He also is an adjunct professor at Carnegie Mellon's Heinz College, Graduate School of Information Systems and Management.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.