Reduce and Manage Your Organization’s Insider Threat Risk


Implement an effective insider threat management program.

If you're already a member, click here to log in.

Major Business Pain Points

  • The hard digital wall has crumbled. Organizations have focused on defending against external threats but equally need to protect against insider threats.
  • Poor visibility into your insider threats cannot continue as they can cause significant damage to your organization’s business, workflow, revenue, and reputation.
Reduce and Manage Your Organization’s Insider Threat Risk-Pain Points

Recommendations

Key Points

  • You can’t just throw tools at a human problem. While organizations should monitor critical assets and groups with privileged access to defend against malicious behavior, good management and supervision can help detect and prevent attacks from happening in the first place.
  • Insider threats will persist without appropriate action and culture change. Training and consistent communication of best practices will mitigate vulnerabilities to accidental or negligent attacks.
  • Without a formal policy and procedure, monitoring for insider threats can only be ad hoc at best, or at worst miss essential information. Target your monitoring of critical assets and users with privileged access to cover all kinds of insider threats.

Approach

Reduce and Manage Your Organization’s Insider Threat Risk-Recommendations
  • Effective and efficient management of insider threats begins with a threat and risk assessment to establish which assets and which employees are associated with sensitive or critical data, as well as to determine the current maturity of your security posture.
  • This blueprint will walk through the steps of understanding what constitutes insider threat, your current security maturity, how to implement an insider threat program, and best practices for monitoring your organization.

Methodology and Tools

Executive Brief

Read the concise Executive Brief to find out why you should reduce and manage your organization’s insider threat risk and review the methodology.

  • Reduce and Manage Your Organization's Insider Threat Risk – Executive Brief
  • Reduce and Manage Your Organization's Insider Threat Risk – Phases 1-2

1. Appreciate what insider threats are and where they come from

Understand the risks and threats associated with insider threat. Consider the controls to minimize insider threat. Include insider threats as part of your threat and risk assessment.

  • Reduce and Manage Your Organization's Insider Threat Risk – Phase 1: Understand What Insider Threats Are and Where They Come From
  • Threat and Risk Assessment Tool
  • Threat and Risk Assessment Process Template

2. Implement an insider threat program

Develop an insider threat program. Create a micro segmentation of assets and users. Customize an employee monitoring policy.

  • Reduce and Manage Your Organization's Insider Threat Risk – Phase 2: Implement an Insider Threat Program
  • Employee Monitoring Policy – IT-Facing
  • Employee Monitoring Policy – Employee-Facing

All resources on this page are provided to Cyber Leadership Hub members under license from third parties including Info-Tech Research Group Inc, a global leader in providing IT research and advice.