Posts Tagged ‘Insider Threat’
How to Mitigate Insider Risk Throughout the Employee Lifecycle
This checklist will help you determine the effectiveness of your insider risk management processes throughout these three phases of an employee or contractor’s lifecycle:
Read MoreHow to Run Effective Insider Risk Investigations
This checklist will help you boost the effectiveness of your insider risk investigations in three categories:
Read MoreThe Enemy of My Enemy is My Friend: Strengthening Insider Threat Resilience with Cyber-Physical Integration
A tactical approach to blending cyber and physical security intelligence operations A Strategic Mindset Getting Tactical MITRE Converged Integrated Defense Framework In part one of this two-part overview, I addressed many of the key themes and priorities required to mitigate insider risk properly. There has been a great deal of discourse relating to how an…
Read MoreMinimizing IP Theft and Insider Threats During Times of Layoffs
This article was originally featured on Security Today Building out cross-functional collaboration between cyber and physical security teams will create a more unified approach, where a common language is established to better understand each department’s key priorities and processes. Doing so ensures there is collective monitoring of identified risk groups or individuals. It also ensures…
Read MoreThe Enemy of My Enemy is My Friend: The Unification of the CSO and CISO
Don’t be surprised by what can be accomplished when a CSO and CISO join forces to mitigate insider risk How Do We Unify the Approach? What Does a Collaborative Approach Look Like? How to Define an Insider Threat Pre-Incident Indicators of Compromise The Common Insider Incident Investigation Scenario A Typical Genesis of a SIEM Alert…
Read MoreUsing Insider Threat Awareness as a Risk Management Strategy
Searching for Insider Threat Indicators Insider Threat Awareness Strategies Teamwork Enhances Insider Threat Management Keys to Workforce Engagement for Insider Threat Prevention Effective Insider Threat Awareness Management Does Ontic Offer an Insider Threat Monitoring Solution? Companies are increasing their focus on building insider threat awareness to create more resilient defenses against theft and unauthorized access…
Read MoreInsider Threat Management: Tackling Your Organization’s Most Critical Risk Vulnerability
While employees are the strongest defense a company has against insider threats, they can also be the biggest risk. Having employees with authorized access to sensitive information, technology, and people poses an inherent threat to organizations, especially with today’s remote workforce. Even with the right technology deployed, insiders are the most critical link in the…
Read MoreWhy the Insider Threat Will Motivate Cyber and Physical Teams to Collaborate More Than Ever in 2022
This article was originally featured in IFSEC Global The convergence of cyber and physical security functions reflects the increasing interplay of digital systems and the physical world, and the growing consensus that a gap in one realm leaves the other exposed. But silos between the two security functions continue to exist. In some cases, it’s…
Read MoreBuilding a Workplace Violence Prevention Program
This checklist provides guidance as you build or refine your workplace violence prevention program and focuses on areas such as:
Read MoreEstablishing a Proper Employee Termination Procedure to Mitigate Insider Threats
Insider Threats are a Company’s Greatest Risk The Proper Procedure for Terminating an Employee Next Steps & Continuous Monitoring It’s not uncommon for companies to be overwhelmed when it comes to managing threats posed by separated employees. Once a terminated employee has left a company, many believe the potential threat has been removed from the…
Read MoreBuilding an Insider Threat Program: 3 Secrets to Success
Content Pre-employment Background Checks and Continuous Review Cycles Internal Training and Feedback Programs Collaboration Across Cyber and Physical Security Teams Final Thoughts The people that make up an organization are the greatest defense against an insider threat — but are also its greatest vulnerability. While one employee has the ability to save a business from…
Read MoreGaining Control of a Rapidly Expanding Threat Landscape
How Companies Stop Insider Threats Before They Occur
Discover proactive strategies to prevent insider threats at the crucial intersection of security measures and human behavior. With insider threats on the rise (up 47% in the last two years), a thorough screening process has become imperative for any new hire. Expanding well beyond a simple ‘check-the-box task,’ screening demands a comprehensive process that uncovers…
Read MoreHow to Mitigate Insider Threats with Continuous Monitoring
In this 45-minute webinar, you’ll learn valuable insights including how to:
Read MoreContinuous Monitoring in the Intelligence Cycle
In this whitepaper, learn the elements of continuous monitoring, including:
Read MoreHostile Termination Preparedness
Get a checklist of criteria to consider as you assess your level of preparedness when it comes to terminations, including:
Read More