E-Discovery Techniques to Investigate and Mitigate Insider Threats

By: Cat Casey, Brian Fox and Doug Bloom

Each year PwC surveys approximately 10,000 CEO, CFOs, CIOs, CISOs and other executives in charge of information security from companies all over the world about the state of their information security and the threats facing their organizations.1 Over the past few years, an interesting trend has emerged: The greatest increase in information security incidents has surrounded the theft of intellectual property (IP), including hard intellectual property, i.e., trade secrets. And the most common perpetrators? Insiders.

0105ai

Law firms, compliance organizations and general counsel’s offices have grown accustomed to regularly handling insider investigations involving the typical employee malfeasance: fraud, abuse, embezzlement and harassment. These groups leverage e-discovery tools to manage the document productions and review for the litigation that often follows these investigations.

usual-suspects

These tools, though, should not be simply reserved for legal actions. When it comes to investigations into the theft of IP, the use of e-discovery tools as part of the investigation itself may significantly reduce the time required to uncover or rule out suspected bad behavior, while helping companies control the cost of what appears to be an increasingly common event.

Continue Reading here

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: