You have to trust them; it is not practical to watch everything each of your employees does every day. The key to successfully mitigating these threats is to turn those advantages for the malicious insiders into advantages for you. This book will help you to do just that. In 2001, ...