E-Discovery Techniques to Investigate and Mitigate Insider Threats
By: Cat Casey, Brian Fox and Doug Bloom
Each year PwC surveys approximately 10,000 CEO, CFOs, CIOs, CISOs and other executives in charge of information security from companies all over the world about the state of their information security and the threats facing their organizations.1 Over the past few years, an interesting trend has emerged: The greatest increase in information security incidents has surrounded the theft of intellectual property (IP), including hard intellectual property, i.e., trade secrets. And the most common perpetrators? Insiders.
Law firms, compliance organizations and general counsel’s offices have grown accustomed to regularly handling insider investigations involving the typical employee malfeasance: fraud, abuse, embezzlement and harassment. These groups leverage e-discovery tools to manage the document productions and review for the litigation that often follows these investigations.
These tools, though, should not be simply reserved for legal actions. When it comes to investigations into the theft of IP, the use of e-discovery tools as part of the investigation itself may significantly reduce the time required to uncover or rule out suspected bad behavior, while helping companies control the cost of what appears to be an increasingly common event.
Continue Reading here