Excellent (and thanks for including the link to the indictment. Will push out my analysis on Monday. You are correct, when the insider threat becomes a reality, the reality is someone you trusted just broke that trust. In this case it was a vendor who added and abetted and made possible the compromise - Why printers? As you point out network access is network access --- Also, they are the font of knowledge by multiple users and will contain PII and health data all information which can be exploited. Great piece.
Check your inbox - I asked someone to send you a “clean” (un-highlighted or under lined) copy of the indictment - figuring you might need a copy for your analysis—which I’m genuinely looking forward to read as I always appreciate your wealth of knowledge
Excellent (and thanks for including the link to the indictment. Will push out my analysis on Monday. You are correct, when the insider threat becomes a reality, the reality is someone you trusted just broke that trust. In this case it was a vendor who added and abetted and made possible the compromise - Why printers? As you point out network access is network access --- Also, they are the font of knowledge by multiple users and will contain PII and health data all information which can be exploited. Great piece.
Christopher
Check your inbox - I asked someone to send you a “clean” (un-highlighted or under lined) copy of the indictment - figuring you might need a copy for your analysis—which I’m genuinely looking forward to read as I always appreciate your wealth of knowledge
Got it!