Showing 1 - 9 of 9 results for the Author - derrick spooner
This technical note explores free and low cost technical solutions to help organizations prevent, detect, and respond to malicious insiders.
This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated.
In this report, the authors provide a snapshot of individuals involved in insider threat cases and recommends how to mitigate the risk of similar incidents.
In this report, the authors describe general observations about and a preliminary system dynamics model of insider crime based on our empirical data.
This paper explores low cost technical solutions that can help organizations prevent, detect, and respond to insider incidents.
In this paper, the authors describe their ongoing development of an insider threat indicator ontology.
In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.
In this report, the authors focus on employees, contractors, and business partners who stole intellectual property to benefit a foreign entity.
In this report, the authors focus on cases in which the insider was employed by a trusted business partner of the victim organization.