£41.99

Itgp Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within

Price data checked 5 days ago

View at Amazon

Price History & Forecast

Last 86 days • 86 data points (No recent data available)

Historical
Generating forecast...
£42.18 £39.73 £40.26 £40.80 £41.33 £41.87 £42.40 25 January 2026 15 February 2026 08 March 2026 29 March 2026 20 April 2026

Price Distribution

Price distribution over 86 days • 2 price levels

Days at Price
Current Price
13 days 73 days · current 0 18 37 55 73 £40 £42 Days at Price

Price Analysis

Most common price: £42 (73 days, 84.9%)

Price range: £40 - £42

Price levels: 2 different prices over 86 days

Description

Every type of organisation is vulnerable to insider abuse, errors or malicious attacks. These can impact reputation, operations and profitability, and expose data, harm the organisation, or deliver valuable intellectual property into competitors’ hands. Insiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems or data, and all of them can bypass security measures through legitimate means. Product overview Insider Threat – A Guide to Understanding, Detecting, and Defending Against the Enemy from Within looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. It also provides some short-term quick fixes that can be applied as your organisations builds an effective insider threat programme. Read this book to learn: The seven organisational characteristics common to insider threat victims. The ten stages of a malicious attack. The ten steps of a successful insider threat programme. How to construct a three-tier security culture, encompassing artefacts, values and shared assumptions. Insider Threat details the measures that organisations can implement to ensure high-impact quick wins, mapping appropriate security controls from the ISO 27001, ISO 27002, and NIST SP 800-53 standards to the following points, and more: Risk mitigation and the eight steps of a risk assessment The importance of training and awareness, and conducting staff background screening Monitoring and auditing the activities of general and privileged users, and quickly responding to suspicious behaviours Metrics to measure insider threat behaviour and mitigation The challenge of external or temporary insiders (such as consultants, support contractors, partners, service providers, temporary employees) Layering physical and digital defences to provide defence in depth The importance of conducting regular penetration testing to evaluate security controls Limiting, monitoring and controlling remote access and mobile device use Ensuring supply-chain security Maintaining an incident management capability It also sets out what not to do, listing a set of worst practices that should be avoided. The insider threat comes in many forms. Insider Threat is the most in-depth guide to help you prepare for them. Order your copy today. About the author Dr Julie Mehan is the founder and president of JEMStone Strategies and a principal in a strategic consulting firm in Virginia. She has delivered cyber security and related privacy services to senior commercial, Department of Defense and federal government clients working in Italy, Australia, Canada, Belgium and the United States. Dr Mehan is also an associate professor at the University of Maryland University College, specialising in courses in cybersecurity, cyberterror, IT in organisations, and ethics in an Internet society.

Product Specifications

Brand
Itgp
Format
paperback
Domain
Amazon UK
Release Date
20 September 2016
Listed Since
29 June 2016

Barcode

No barcode data available

Similar Products You Might Like

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) (SEI Series in Software Engineering)
95% match

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) (SEI Series in Software Engineering)

Addison Wesley

£48.65 25 Feb 2026
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
94% match

Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks

CRC Press

£48.35 27 Feb 2026
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
94% match

Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks

CRC Press

£57.91 01 Apr 2026
Routledge Insider Risk and Personnel Security Textbook
94% match

Routledge Insider Risk and Personnel Security Textbook

Routledge

£127.67 07 Mar 2026
ISO 27001 INTERNAL AUDITS & DATA PROTECTION: STRENGTHENING COMPLIANCE & SECURITY: A Practical Guide to Conducting Internal Audits and Safeguarding Sensitive Data (ISO 27001:2022)
93% match

ISO 27001 INTERNAL AUDITS & DATA PROTECTION: STRENGTHENING COMPLIANCE & SECURITY: A Practical Guide to Conducting Internal Audits and Safeguarding Sensitive Data (ISO 27001:2022)

£49.92 22 Feb 2026
The Security Consultant's Handbook
93% match

The Security Consultant's Handbook

Itgp

£39.95 22 Jan 2026
Walling Out the Insiders: Controlling Access to Improve Organizational Security
93% match

Walling Out the Insiders: Controlling Access to Improve Organizational Security

CRC Press

£76.99 11 Mar 2026
Information Security Incident and Data Breach Management: A Step-by-Step Approach
93% match

Information Security Incident and Data Breach Management: A Step-by-Step Approach

Apress

£38.52 21 Feb 2026
Managing the Insider Threat: No Dark Corners and the Rising Tide Menace
93% match

Managing the Insider Threat: No Dark Corners and the Rising Tide Menace

£50.53 12 Jan 2026
Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers
92% match

Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers

Apress

£37.65 19 Feb 2026
Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition
92% match

Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition

Apress

£40.89 30 Jan 2026
Securing Networks Through Penetration Testing: A Practical Guide
92% match

Securing Networks Through Penetration Testing: A Practical Guide

£43.61 15 Feb 2026
IT Security Controls: A Guide to Corporate Standards and Frameworks
92% match

IT Security Controls: A Guide to Corporate Standards and Frameworks

Apress

£41.76 11 Jan 2026
Auditing Your Information Systems and IT Infrastructure: Practical Audit Programs/Checklists for Internal Auditors
92% match

Auditing Your Information Systems and IT Infrastructure: Practical Audit Programs/Checklists for Internal Auditors

£67.52 10 Jan 2026
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
92% match

Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Apress

£49.45 12 Dec 2025
Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity
92% match

Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity

Packt Publishing

£31.31 28 Jan 2026
Auerbach Publications Security De-Engineering Guide
92% match

Auerbach Publications Security De-Engineering Guide

Auerbach Publications

£153.08 22 Feb 2026
Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach
92% match

Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach

Wiley

£65.78 06 Mar 2026
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
92% match

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

Apress

£43.64 16 Feb 2026
Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition
92% match

Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition

Packt Publishing

£58.19 02 Apr 2026
Information Risk and Security: Preventing and Investigating Workplace Computer Crime
92% match

Information Risk and Security: Preventing and Investigating Workplace Computer Crime

Routledge

£137.61 18 Apr 2026
ISO IEC 27001 Lead Auditor A Complete Guide - 2021 Edition
92% match

ISO IEC 27001 Lead Auditor A Complete Guide - 2021 Edition

£74.97 06 Jan 2026
Cyber Threat Intelligence
92% match

Cyber Threat Intelligence

Wiley

£65.67 17 Mar 2026
ISO 27001:2022 EXPLAINED A COMPREHENSIVE CLAUSE-BY-CLAUSE GUIDE: A Step-by-Step Breakdown of the Standard with Implementation Guides and Required Documents
92% match

ISO 27001:2022 EXPLAINED A COMPREHENSIVE CLAUSE-BY-CLAUSE GUIDE: A Step-by-Step Breakdown of the Standard with Implementation Guides and Required Documents

£53.38 31 Jan 2026