Detecting and Preventing Insider Risks

Detecting and Preventing Insider Risks

- Premium Members Only Content - Exclusive Video -

For more than a decade, Carnegie Mellon University's CERT Insider Threat Center has studied and mapped the various risks of fraud, sabotage and theft of intellectual property. But the landscape is changing, and the latest research offers new insights on managers who commit fraud, as well as innocent employees who are exploited by external agents.

In this video interview, Dawn Cappelli and Randy Trzeciak of the insider threat center discuss:

  • Who typically commits insider crimes - and how;
  • How employees are being victimized from outside;
  • Why our critical infrastructure is at heightened risk.


In its research, the Insider Threat Center at Carnegie Mellon University CERT has studied hundreds of insider crimes, and it has identified three distinct patterns:

  • Sabotage committed by disgruntled employees who want to exact vengeance upon an organization;
  • Theft of intellectual property by employees who feel entitlement;
  • Fraud perpetrated by those who have privileged access to financial accounts.

The latest research shows that managers increasingly are involved in insider crimes, and employees often are often the unwitting tools of outsiders who use social engineering to worm their way into organizations.

Emerging technology gives criminals greater opportunity to commit insider crimes. But it also gives security organizations better tools for early detection and prevention.

In this exclusive video interview, Dawn Cappelli and Randy Trzeciak of the Carnegie Mellon CERT Insider Threat Center share their latest insights and advice on the most common insider crimes and how to detect them. They also discuss why the US critical infrastructure is at heightened risk and what can be done to ensure better protection.

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.