Take Steps to Mitigate the Threat of Insiders

Posted by Troy Kitch on Oracle Blogs See other posts from Oracle Blogs or by Troy Kitch
Published on Wed, 05 Jan 2011 22:25:56 -0800 Indexed on 2011/01/06 6:56 UTC
Read the original article Hit count: 421

Register now for our upcoming Feb 23 Webcast The Insider Threat, Understand and Mitigate Your Risks. Insiders, by virtue of legitimate access to their organizations' information and IT infrastructure, pose a significant risk to employers. Employees, motivated by financial problems, greed, revenge, the desire to obtain a business advantage, or the wish to impress a new employer, have stolen confidential data, proprietary information, or intellectual property from their employers. Since this data typically resides in databases, organizations need to consider a database security defense in depth approach that takes into account preventive and detective controls to protect their data against abuse by insiders.

Register now and learn about:


  • Actual cases of insider cyber crimes

  • Three primary types of insider cyber crimes: IT sabotage, theft of intellectual property (e.g. trade secrets), and employee fraud

  • Lack of controls around data that allow these crimes to be successful

  • Solutions to help secure data and database infrastructure


© Oracle Blogs or respective owner

Related posts about Database Vault

Related posts about insider threat