The Enemy of My Enemy is My Friend: Strengthening Insider Threat Resilience with Cyber-Physical Integration

This article was also written in partnership with Josh Massey, Director of Enterprise Risk of The MITRE Corporation’s Enterprise Security Assurance department. As such, Mr. Massey is responsible for establishing, executing, supervising, and directing the implementation and oversight of MITRE’s insider threat program and strategic protection initiatives across MITRE’s six federally funded research and development…

Read More

Minimizing IP Theft and Insider Threats During Times of Layoffs

This article was originally featured on Security Today Building out cross-functional collaboration between cyber and physical security teams will create a more unified approach, where a common language is established to better understand each department’s key priorities and processes. Doing so ensures there is collective monitoring of identified risk groups or individuals. It also ensures…

Read More

The Enemy of My Enemy is My Friend: The Unification of the CSO and CISO

Don’t be surprised by what can be accomplished when a CSO & CISO join forces to fight insider threats. How Do We Unify the Approach? So What Does a Collaborative Approach Look Like? Pre-Incident Indicators of Compromise The Common Insider Threat Investigation Scenario Context is Key Understanding the Bigger Picture Whether you are fighting anonymous…

Read More

Using Insider Threat Awareness as a Risk Management Strategy

Insider Threat Awareness header image

Searching for Insider Threat Indicators Insider Threat Awareness Strategies Teamwork Enhances Insider Threat Management Keys to Workforce Engagement for Insider Threat Prevention Effective Insider Threat Awareness Management Does Ontic Offer an Insider Threat Monitoring Solution? Companies are increasing their focus on building insider threat awareness to create more resilient defenses against theft and unauthorized access…

Read More

Insider Threat Management: Tackling Your Organization’s Most Critical Risk Vulnerability

While employees are the strongest defense a company has against insider threats, they can also be the biggest risk. Having employees with authorized access to sensitive information, technology, and people poses an inherent threat to organizations, especially with today’s remote workforce. Even with the right technology deployed, insiders are the most critical link in the…

Read More

Why the Insider Threat Will Motivate Cyber and Physical Teams to Collaborate More Than Ever in 2022

This article was originally featured in IFSEC Global The convergence of cyber and physical security functions reflects the increasing interplay of digital systems and the physical world, and the growing consensus that a gap in one realm leaves the other exposed. But silos between the two security functions continue to exist. In some cases, it’s…

Read More

Building an Insider Threat Program: 3 Secrets to Success

Building an Insider Threat Program Hero

Content Pre-employment Background Checks and Continuous Review Cycles Internal Training and Feedback Programs Collaboration Across Cyber and Physical Security Teams Final Thoughts The people that make up an organization are the greatest defense against an insider threat — but are also its greatest vulnerability. While one employee has the ability to save a business from…

Read More

How Companies Stop Insider Threats Before They Occur

Discover proactive strategies to prevent insider threats at the crucial intersection of security measures and human behavior. With insider threats on the rise (up 47% in the last two years), a thorough screening process has become imperative for any new hire. Expanding well beyond a simple ‘check-the-box task,’ screening demands a comprehensive process that uncovers…

Read More