Insider threat, one of the greatest drivers of security risks that organizations face
It only takes one malicious insider to cause significant harm. Typically, a malicious insider utilizes their (or other employee’s) credentials to gain access to a given organization’s critical assets. Many organizations are challenged to detect internal nefarious acts, often due to limited access controls and the ability to detect unusual activity once someone is already inside their network.
A significant number of executives fall victim to common misconceptions about insider risk and, therefore, they typically do not believe that their organization’s own workers pose a significant threat. Even those who do, find it challenging to make significant headway, as doing so requires tackling a host of thorny legal and HR issues. As a result, many organizations have underinvested in this area.
Our paper, The Increasing Threat from Inside: A Proactive and Targeted Approach to Managing Insider Threat, helps firms focus on the highest-risk areas and develop an effective and practical insider risk program.
In 2018, of the 5 billion records stolen/compromised, over 2 billion were a result of insider circumstancesRisk Based Security: Data Breach Trends report 2018
Organizations simply cannot afford to ignore the threat any longer. Companies are waking up to the fact that insider threat can pose considerable harm to their operational resilience, financial status, and reputation. Across industries, regulators, government agencies, and industry groups have signaled that organizations need to take insider threat seriously.
Watch Paul Mee, Partner and Cyber Platform Lead, and Matthew Gruber discuss how an organization can identify and mitigate insider risks.
75% of companies believe they have appropriate controls to mitigate insider threat—but more than 50% of companies had a confirmed insider attack in the past 12 monthsCrowd Research Partners: 2018 Insider Threat Report
Applying data loss prevention technology, monitoring software, or compliance surveillance tools is not enough. Organizations need to scale their diligence and defenses appropriately to their inherent insider risk exposure by integrating technology and organizational disciplines to identify, detect and mitigate risks before they materialize or cause harm.
Leaders in this area:
- Have the right level of senior stakeholder engagement,
- Use a risk-based prioritization of what to monitor and protect, and most importantly,
- Have implemented joined-up procedural arrangements with clear and tested roles and responsibilities to enable the right response when unusual behavior is identified.
Despite the growing consensus that insiders represent a considerable threat with potentially severe consequences, some organizations remain in denial. They fall victim to generally accepted myths that make them believe that “this won’t happen to us” (see Myth Busters below).
Taking a practical approach to insider risk
Start Small and Focused
Implementing an effective insider risk program requires a design tailored to the specific culture, processes, and risks of the organization. It’s important to start small and focus on a clearly defined high-risk employee sub-group to work through the organizational issues that need to be solved. Our paper describes a practical approach to designing and implementing a successful insider risk program.
With insider threat only increasing in prominence, organizations simply cannot afford to ignore the threat. Getting it right will deliver clear benefits, but delays could be costly. Take a proactive approach to managing insider risk – start small, but start now.
RELATED INSIGHTS