Insider Threats is one of the greatest security risks to your organisation’s information assets. Read more.

"*" indicates required fields

The cases of whistleblowers Bradley (Chelsea) Manning and Edward Snowden showed how difficult it is to prevent determined and informed insiders, even in high security environments like the US Department of Defence and the National Security Agency.  However, most other enterprises have far more to worry about in terms of insider theft or fraud, according to the UK’s Fraud Prevention Service (CIFAS), which reported a 43% increase in fraud in just 12 months.

This fully-referenced White paper examines:

  • The size of the insider problem and who the culprits are;
  • Why effective controls for one scenario may be ineffective for others;
  • Why the FBI recently switched to behavioural detection methodology; and
  • Why baselining normal behaviour and monitoring for abnormal activity are the most effective ways to combat these threats, regardless of insider motivation.

Key terms and topics addressed in this White paper: 

  • Why careless employees are top of the list;
  • Why external trusted affiliates with access are a key culprits;
  • Why two thirds of IT professional regards insiders as the greatest security risk;
  • Why technical and behavioural aspects are critical;
  • Why the FBI switched from a predictive model to behavioural baselining;
  • Predictive analytics vs Behaviour Anomaly Detection;
  • Cloud computing,  third party service providers,  mobile devices and increased risk;
  • The importance of log collection and regular analysis;
  • The 3 levels of control to close gaps and loopholes; and
  • Why behavioural analysis is critical to early detection whether the insider is careless, malicious or ethical.

DOWNLOAD OUR WHITE PAPER TO UNDERSTAND:

  • The security risk Insider Threats pose
  • The nature of Insider Threats, both malicious and careless
  • The importance of monitoring anomalous behaviour
  • Why separation of duties is fundamental in defending your organisation

SIGN UP TO RECEIVE CYBER SECURITY INSIGHTS

Read by directors, executives, and security professionals globally, operating in the most complex of security environments.