tag:blogger.com,1999:blog-4088979.post115862580490700276..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Insider Threat StudyRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-4088979.post-1158698559473886582006-09-19T16:42:00.000-04:002006-09-19T16:42:00.000-04:00This kind of stuff is pervasive. I sat in on a W...This kind of stuff is pervasive. <BR/><BR/>I sat in on a Webinar last week entitled: "Webinar: Protecting Your Customers’ Data from Insider Security Threats". During the Webinar they kept mentioning things like: '70% of all threats are internal'.<BR/><BR/>This was to sell a product that sat on the desktop and monitored the user to ensure "compliance" with policy.<BR/><BR/>Oh, and BTW: This is also being discussed as it will allow us to meet audit requirements of the government.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1158671421418987302006-09-19T09:10:00.000-04:002006-09-19T09:10:00.000-04:00Richard,I believe Dark reading is hosting a webina...Richard,<BR/>I believe Dark reading is hosting a webinar on this on Monday September 25 http://www.darkreading.com/webinar.asp?doc_id=28032<BR/>It should be interesting to see how this is presented after your review of the study. Should generate some interesting questions at the end, if they are allowed.James.Costellohttps://www.blogger.com/profile/06509097221703543487noreply@blogger.com