A Guide to Cyber Security KPIs

A Guide to Cyber Security KPIs

Archive Blog Archives

Insider Threats: Why behaviour is key to early detection

The cases of whistleblowers Bradley (Chelsea) Manning and Edward Snowden showed how difficult it is to prevent determined and informed insiders, even in high security environments like the US Department of Defence and the National Security Agency.  However, most other enterprises have far more to worry about in terms of insider theft or fraud, according to the UK’s Fraud Prevention Service (CIFAS), which reported a 43% increase in fraud in just 12 months.

This fully-referenced White paper examines:

  • The size of the insider problem and who the culprits are;
  • Why effective controls for one scenario may be ineffective for others;
  • Why the FBI recently switched to behavioural detection methodology; and
  • Why baselining normal behaviour and monitoring for abnormal activity are the most effective ways to combat these threats, regardless of insider motivation.

Key terms and topics addressed in this White paper: 

  • Why careless employees are top of the list;
  • Why external trusted affiliates with access are a key culprits;
  • Why two thirds of IT professional regards insiders as the greatest security risk;
  • Why technical and behavioural aspects are critical;
  • Why the FBI switched from a predictive model to behavioural baselining;
  • Predictive analytics vs Behaviour Anomaly Detection;
  • Cloud computing,  third party service providers,  mobile devices and increased risk;
  • The importance of log collection and regular analysis;
  • The 3 levels of control to close gaps and loopholes; and
  • Why behavioural analysis is critical to early detection whether the insider is careless, malicious or ethical.

Read More
1 2 3 8