Buy new:
FREE Shipping
Get free shipping
Free 5-8 day shipping within the U.S. when you order $25.00 of eligible items sold or fulfilled by Amazon.
Or get 4-5 business-day shipping on this item for $5.99 . (Prices may vary for AK and HI.)
Learn more about free shipping
on orders over $25.00 shipped by Amazon or get Fast, Free Shipping with Amazon Prime
Arrives: Tuesday, Jan 26 Details
Fastest delivery: Monday, Jan 25
Order within 7 hrs and 53 mins
In Stock.
As an alternative, the Kindle eBook is available now and can be read on any device with the free Kindle app.
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Ships from Amazon.com
Sold by Amazon.com
Ships from

Sold by

Inside Jobs: Why Insider ... has been added to your Cart

Other Sellers on Amazon
& FREE Shipping on eligible orders. Details
Have one to sell?
Loading your book clubs
There was a problem loading your book clubs. Please try again.
Not in a club? Learn more
Amazon book clubs early access

Join or create book clubs

Choose books together

Track your books
Bring your club to Amazon Book Clubs, start a new book club and invite your friends to join, or find a club that’s right for you for free.
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more

Follow the Authors

See all
Something went wrong. Please try your request again later.

Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore Hardcover – October 20, 2020

4.7 out of 5 stars 9 ratings

See all formats and editions Hide other formats and editions
New from Used from

Books with Buzz
Discover the latest buzz-worthy books, from mysteries and romance to humor and nonfiction. Explore more
click to open popover

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
    Windows Phone
  • Click here to download from Amazon appstore

To get the free app, enter your mobile phone number.


Special offers and product promotions

From the Publisher

data leak

Editorial Reviews


“In an era of sprawling cloud and consumerized IT, the challenge of security is not just to figure out who and what needs to be protected, but how to do so in the simplest way possible. This book drives this point home, and shows how to take friction out of security for users without putting data in jeopardy.” —DUG SONG, cybersecurity expert, cofounder and CEO of Duo Security, and cofounder of Arbor Networks

“This book addresses a problem that needs focus—insider threat is a very real issue that organizations need to grapple with and understand. It’s one of the greatest underserved risks in cybersecurity today.” —AMIT YORAN, CEO of Tenable, former president of RSA, former national cybersecurity director at DHS, and former director of US-CERT

“I never thought I’d read a book about cybersecurity insider threats that is actually—dare I say it—engaging. By illustrating technical points with compelling stories and examples, this book becomes a productive read not only for the CISO, but also for the CIO, the CHRO and the CEO.” —CHIP HEATH, author of best-sellers Switch, Made to Stick, Decisive, and The Power of Moments

“Today, some of the most pressing problems in security revolve around insider threats and data security. Code42’s book provides new perspective on these problems and how much more important they have become in the increasingly remote and distributed workplace, suggesting major changes in how we approach data security.” —MARTIN ROESCH, cybersecurity expert, creator of Snort, and founder of Sourcefire

“I’ve seen too many organizations feel they have a cybersecurity program because they have a few cybersecurity products. This book really shows how the care of your data is fundamental to protecting it.” —RON GULA, cyber industry pioneer; developer of Dragon, one of the first commercial network intrusion detection systems; cofounder of Tenable Network Security

“While many executives understand security threats from outside their company, most don’t protect their business from insiders. Employees lose, steal, or misplace data more often than businesses realize, costing billions. Inside Jobs is packed with powerful examples and actionable advice every senior executive needs to know in a fast-paced book that can be finished in one plane ride.” —DAVID MEERMAN SCOTT, marketing strategist, entrepreneur, and best-selling author of eleven books, including Fanocracy and The New Rules of Marketing & PR

“Data leaks are going to happen. Code42’s approach to insider threat detection shows you exactly what you need to know when your confidential data is walking out the door and what to do about it.” —MIKE WASSERMAN, security orchestration engineer at The Pokémon Company International
“Minneapolis-based Code42 (data security software) explores the challenges of the digital revolution in Inside Jobs: Why Insider Risk is the Biggest Threat You Can’t Ignore and makes the case that threats from insiders introduce significant risk to the enterprise.  

The modern enterprise seeks competitive advantage through digital transformation initiatives that require a highly collaborative culture. In the rush to deliver tools to enhance innovation, provide better access to information, and improved employee collaboration, many enterprises unintentionally introduce intellectual property, privacy, and security risks that may have serious consequences.  

Inside Jobs recommends embracing enterprise collaboration, but suggests addressing unhealthy, pervasive attitudes that introduce ‘data security dilemmas.’ These dilemmas force security teams to introduce a patchwork of policies, processes, and technologies that often don’t protect enterprises, customers, or shareholders. The book focuses on three themes: introducing a new data security mindset, recruiting change agents to support today’s modern collaboration culture, and recommending new processes and technology to facilitate collaboration while protecting data. 

Addressing insider threats starts by acknowledging and addressing core reality: many employees feel entitled to share, copy, and store company files and data anywhere it helps them be more productive.  If there is a will to bypass today’s processes and data security controls, there is likely a method for employees to do it.  Rather than fight the uphill battle of data exfiltration with more controls, more policies, more people, Inside Jobs suggests enlisting a team of cross-functional change agents focused on addressing insider risk who are tasked with promoting a progressive, safe, and responsible data security culture.

Building a culture of data security that adequately addresses insider threats takes enterprise wide training, innovation, and collaboration friendly data security policies, and the executive support.  Enterprises must also have a focused, cross-functional team regularly evaluating enterprise readiness, awareness, and response to evolving insider threats.

Inside Jobs is a timely reminder how insider risks are often introduced as enterprises digitize and modernize. The book uses real word examples and presents dire consequences from mistakes made in the effort to gain competitive advantage.  The book doesn’t seek to shame us, but remind us that enterprise risk is often introduced by initiatives with the best of intentions.” —PETE CHRONIC, cybersecurity thought leader, former SVP and CISO of Warner Media and CSO of Earthlink, and author of The Cyber Conundrum

About the Author

Joe Payne is the president and CEO of Code42, a leading data security company that focuses on reducing the risk of data leakage from insider threats. With more than twenty years of experience as a CEO, he has a proven track record leading high growth security and technology companies. Previously, Joe served as CEO of eSecurity, Eloqua, and eGrail, and as president of iDefense. He has led some of the world’s best security researchers and worked with top US government agencies to improve their risk profiles.

Jadee Hanson is the chief information security officer and chief information officer at Code42. She has more than sixteen years of information security experience and a proven track record of building IT and security programs. Prior to Code42, she held a number of senior leadership roles in security at Target Corporation and Deloitte. Jadee is also the founder of the non-profit organization Building Without Borders.

Mark Wojtasiak is the vice president of portfolio strategy and product marketing at Code42, bringing with him more than twenty years of B2B data storage, cloud, and security experience. He previously worked at Seagate for ten years, where he held a number of senior strategy roles in global marketing and product management, as well as served in marketing leadership at Now Micro.

Code42 is the leader in insider risk detection and response. Native to the cloud, Code42 rapidly detects data loss, leak, theft and sabotage as well as speeds incident response—all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees. www.code42.com

Product details

  • Publisher : Skyhorse (October 20, 2020)
  • Language : English
  • Hardcover : 192 pages
  • ISBN-10 : 1510764488
  • ISBN-13 : 978-1510764484
  • Item Weight : 12.8 ounces
  • Dimensions : 6 x 0.8 x 9 inches
  • Customer Reviews:
    4.7 out of 5 stars 9 ratings

An Amazon Book with Buzz: "The Four Winds" by Kristin Hannah
"A timely novel highlighting the worth and delicate nature of Nature itself." -Delia Owens Learn more

Customer reviews

4.7 out of 5 stars
4.7 out of 5
9 global ratings
5 star
4 star
3 star 0% (0%) 0%
2 star 0% (0%) 0%
1 star 0% (0%) 0%
How are ratings calculated?

Top reviews from the United States

Reviewed in the United States on November 13, 2020
Verified Purchase
Reviewed in the United States on November 4, 2020
Reviewed in the United States on October 30, 2020
Reviewed in the United States on November 2, 2020
Reviewed in the United States on December 7, 2020
Reviewed in the United States on December 7, 2020
Reviewed in the United States on November 4, 2020