Human Resources Insider Threat Guidelines
Step 14: Document Findings in a Presentation
You now have all of the information needed to develop the slide presentation that provides information to the San Francisco City office to avert situations similar to the Childs case.
Develop a narrated slide presentation of 10-15 slides that shows your findings. Include all of the information you gathered from your previous research, summaries, and reports.
Submit your final presentation with appendices when complete.
Step 1: Review the Terry Childs Case
Before getting started on the presentation, you will want to first learn about the Terry Childs case. Research the case and write a one-page summary of your findings. Your summary should answer the following questions:
- What led to Childs being charged with a crime?
- How did his employer respond to his actions? What did it do right and/or wrong?
- What could the company have done to better secure its assets?
Your summary should be thorough and include a references page. The information gathered will be used in your final presentation. You will use this summary as Appendix A to your presentation.
Submit the Terry Childs Case Review for feedback.
Step 5: Psychological Factors
In the previous three steps, you completed simulation activities handling insiders. In the next few steps, you’ll examine intrusion motives/hacker psychology. In order to fully understand the Terry Childs case, it is important to understand that one’s internal motivations play a significant role in their actions.
Your next assignment will require you to create a Psychological Factor Matrix that summarizes types of hackers and actors, their motivations, and what sort of standards, policies, and guidelines would be most suitable to mitigate their impact. In order to prepare for this assignment, you will need to dig deeper into the psychological factors that affect hackers. Review the hacker psychology and sociological aspects resource on the hackers and actors topic page and document the following:
- What psychological factors motivate hackers and actors (e.g., addiction, crime, greed, status)?
- Give examples where these motivations were a factor in a cyberattack.
- What can organizations do to be more proactive in identifying and addressing these threats?
While you do not need to submit your findings, they will be essential to the completion of your Profile Matrix in a later step.