web analytics

Live panel discussion on insider threats and abuse of privilege – Source: securityboulevard.com

Rate this post

Source: securityboulevard.com – Author: Scott Wright

And as we move into artificial intelligence, we have to look at different things like hijacked artificial intelligence with inside trades that can open up those kinds of insider threats. 

SC: For Greenpeace Canada, I would say three things: Corporate espionage, ransomware through an attack vector like a USB, and anything that brings damage to our brand, like posts on social media.

And working from home has opened a whole other can of worms. Now if you are using a computer somewhere and stay logged in and something happens, that can be another insider threat. 

How are insider threats detected?

SC: We use something called SOCRadar, which is a v-SOC. This is done without logging. It’s a lot of open-source intelligence, looking at the dark web, and matching it to various indicators of compromise. Then, there are SEM tools that are run by our parent organization. Thirdly, we have various things in place for endpoint detection and response.

RH: You can take a look through logging or look for breadcrumbs to find out what the source of the problem was. You want to make sure someone can’t get in and break stuff and get out without leaving a clear trail which can be used. So, that’s access management, log management, and CAA. 

You also have to look for signs of possible disgruntled workers. Think about the nineties when there were so many disgruntled workers and there were unfortunate crimes of violence that were associated with them. If employees are not respecting the workplace, they could take out their frustrations on your security or brand. You have to ensure that your people are comfortable and happy.

JC: Insider threats can be difficult to detect. In most cases, they go really unnoticed for months, if not years, and some of them even longer. It’s important to realize that these are people with legitimate access to your networks. They are people who use their access in a way that causes harm to the organization as a whole. For that reason, insider threat prevention solutions are less digital and more focused on personal.

Whether the insider is a malicious employee or a contract or with compromised credentials, the list is completely endless. But we have to be able to identify them. And to identify them, we have to understand behaviour analysis. We have to be able to identify privileged access that the people have, and why they have it. Are there any anomalies in their life that may lead them to do something malicious?

How can employees prevent “insider threats”?

SC: At the end of the day, it comes down to just awareness. And if you don’t have that awareness, you don’t know what to identify. Everyone’s at risk.

Education of the senior management team and C-level executives is the most important to have them understand the risk of internal threats. And I see that lacking. 

JC: Preventing threats is done through awareness. We don’t have all of the answers, but we do have the ability to reach out to people and allow them to see what they may not have seen before and be able to share it within. Because it’s really quite amazing what happens when a person starts to realize outside the box what this world needs in order to create those preventions in place. 

What content and communications should you use to educate your staff on insider threats?

RH: Maybe part of our answer in the future is through AI. It could validate the information that your employees are sharing. How they are doing, what’s their tone in emails, what they are doing. Almost like a monitoring system for internal communications that would help you find insider threats before they happen based on the way people are speaking or based on questions they ask. 

JC: Corporations have to realize that awareness is a payable skill. We can’t just have one person show up and give free information all of the time. Companies do not want to pay money to understand this, they expect one person to identify all the threats. But come year-end, you need to allocate money towards insider threat prevention which means training your people.

SC: Start from the top down and make C-level executives understand the value of doing these risk assessments and paying for the education of staff. A structured course by HR has to be there. Not just on phishing but on the entire threat landscape, insider threats, and compliance.

The most important thing I can’t stress enough is the importance of C-Level executives understanding and having a budget.

60% of data breaches are linked back to insider threats, so your organization on how they occur. As we learned in this panel, awareness is key. In order for your organization to have awareness you need executive buy-in, a budget, and a continuous program. 

Want to hear more from this panel? Watch the whole session here.

Click Armor is the first highly interactive security awareness platform, with engaging foundational courses and 3-minute weekly challenges that employees love. We offer content on everything from security basics, phishing and social engineering to passwords and privacy.

Even if your organization already has a solution, there’s a high likelihood that some employees are still not engaging and are exposing your systems and information to cyberthreats. Click Armor offers a special “remediation” package that complements existing solutions that don’t offer any relevant content for people who need a different method of awareness training.

Scott Wright is CEO of Click Armor, the gamified simulation platform that helps businesses avoid breaches by engaging employees to improve their proficiency in making decisions for cyber security risk and corporate compliance. He has over 20 years of cyber security coaching experience and was creator of the Honey Stick Project for Smartphones as a demonstration in measuring human vulnerabilities.

Original Post URL: https://securityboulevard.com/2023/05/live-panel-discussion-on-insider-threats-and-abuse-of-privilege/

Category & Tags: Careers,DevOps,Security Awareness,Security Bloggers Network,Threats & Breaches,CISO Suite,CSAF,CSAF Transcript,CSGA,Cyber Security Risks,Employee Awareness,Greenpeace,Home,insider threat,James Castle,Ryan Healey-Ogden,Security Culture,Seed n soil posts,Sid Choudhuri,tips,Webinars – Careers,DevOps,Security Awareness,Security Bloggers Network,Threats & Breaches,CISO Suite,CSAF,CSAF Transcript,CSGA,Cyber Security Risks,Employee Awareness,Greenpeace,Home,insider threat,James Castle,Ryan Healey-Ogden,Security Culture,Seed n soil posts,Sid Choudhuri,tips,Webinars

Views: 0

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post