Anti-Phishing, DMARC , Business Email Compromise (BEC) , Email Threat Protection

Ingredients of a Good Insider Risk Program

Former FBI Special Agent on How to Design a Program That Analyzes User Behavior
Peter J. Lapp, former special agent at the FBI

Any technology that allows you to do a full-person assessment by taking into account nontechnical data as well as technical data is a value-add to an insider risk program, says Peter J. Lapp, former special agent at the FBI.

See Also: OnDemand | A Master Class on Cybersecurity: Roger Grimes Teaches Data-Driven Defense

He recommends using "a technology that has analysis of user behavior. The technology needs to look at and identify employees whose risk scores have started to increase and compare them with insider risk areas."

In a video interview with Information Security Media Group, Lapp also discusses:

  • How to create an insider risk management strategy;
  • What tools and technologies can be leveraged for an insider risk program;
  • How to design a meaningful training program.

Lapp is the founder of PJ Lapp Consulting, where he focuses his vast knowledge and experience in the areas of counterintelligence and insider risk. As a retired special agent of the Federal Bureau of Investigation, Lapp is highly experienced in the areas of counterintelligence, espionage, economic espionage, and trade secret theft.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing fraudtoday.io, you agree to our use of cookies.