by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : August 30, 2016
BackStory 34 August 30, 2016 FCW.COM The data needed to detect insider threats Given how many breaches originate from insider threats (whether malicious or unwitting), the government must improve its ability to spot and mitigate such risks. A new book by Deloitte Consulting’s Michael Gelles details 25 data streams that agencies can use as potential risk indicators. Access attributes and behaviors • Access levels • Security clearance • Privileged user rights Compliance cases • Audit remediation process • Noncompliance with training requirements • Organizational policy violations Data exfiltration • Large outbound email traffic volume • Email messages with attachments sent to suspicious recipients • Anomalies with copiers, fax machines and other transmittal devices • Removable media alerts and anomalies External data • Social media anomalies • Financial stressors • Criminal and civil history background checks • Foreign contacts and non-temporary duty foreign travel Network activity • Collection of large quantities of files • Antivirus/anti- malware alerts • Excessively large downloads • Access request denials Personnel management • Declining performance ratings • Notice of resignation or termination • Reprimand or warning • Temporary duty status and location • Title 42 employees • Visiting staff Physical security • Physical access request denials • Physical access anomalies Time and expense • Expense violations • Time entry violations Source: “Insider Threat: Prevention, Detection, Mitigation and Deterrence” by Michael G. Gelles 0830fcw_034.indd 34 8/9/16 1:18 PM
August 15, 2016
September 15, 2016