Posts Tagged ‘Insider Threat’
The Enemy of My Enemy is My Friend: Strengthening Insider Threat Resilience with Cyber-Physical Integration
This article was also written in partnership with Josh Massey, Director of Enterprise Risk of The MITRE Corporation’s Enterprise Security Assurance department. As such, Mr. Massey is responsible for establishing, executing, supervising, and directing the implementation and oversight of MITRE’s insider threat program and strategic protection initiatives across MITRE’s six federally funded research and development…
Read MoreMinimizing IP Theft and Insider Threats During Times of Layoffs
This article was originally featured on Security Today Building out cross-functional collaboration between cyber and physical security teams will create a more unified approach, where a common language is established to better understand each department’s key priorities and processes. Doing so ensures there is collective monitoring of identified risk groups or individuals. It also ensures…
Read MoreThe Enemy of My Enemy is My Friend: The Unification of the CSO and CISO
Don’t be surprised by what can be accomplished when a CSO & CISO join forces to fight insider threats Contents How do we unify the approach? So what does a collaborative approach look like? Pre-Incident Indicators of Compromise The Common Insider Threat Investigation Scenario Context is Key Understanding the Bigger Picture Whether you are fighting…
Read MoreUsing Insider Threat Awareness as a Risk Management Strategy
Companies are increasing their focus on building insider threat awareness to create more resilient defenses against theft and unauthorized access to insider information. In addition, as the cybersecurity and physical security worlds meld closer together, security teams are teaming up to combat insider threats to eliminate vulnerabilities. In many ways, managing external threats is more…
Read MoreInsider Threat Management: Tackling Your Organization’s Most Critical Risk Vulnerability
While employees are the strongest defense a company has against insider threats, they can also be the biggest risk. Having employees with authorized access to sensitive information, technology, and people poses an inherent threat to organizations, especially with today’s remote workforce. Even with the right technology deployed, insiders are the most critical link in the…
Read MoreWhy the Insider Threat Will Motivate Cyber and Physical Teams to Collaborate More Than Ever in 2022
This article was originally featured in IFSEC Global The convergence of cyber and physical security functions reflects the increasing interplay of digital systems and the physical world, and the growing consensus that a gap in one realm leaves the other exposed. But silos between the two security functions continue to exist. In some cases, it’s…
Read MoreBuilding a Workplace Threat Assessment Program
This checklist provides guidance as you build or refine your threat assessment program and focuses on areas such as:
Read MoreEstablishing a Proper Employee Termination Procedure to Mitigate Insider Threats
It’s not uncommon for companies to be overwhelmed when it comes to managing threats posed by separated employees. Once a terminated employee has left a company, many believe the potential threat has been removed from the workplace. However, a successful employee termination procedure – one that avoids risks posed by insider threats – is actually…
Read MoreInsider Threats: Protecting Against the Enemy Within
This checklist will help you determine the effectiveness of your insider threat awareness processes in three categories:
Read MoreBuilding an Insider Threat Program: 3 Secrets to Success
The people that make up an organization are the greatest defense against an insider threat — but are also its greatest vulnerability. While one employee has the ability to save a business from a detrimental attack, another can cause incredible damage to a company, its brand and its people. For this reason, as you’re building…
Read MoreGaining Control of a Rapidly Expanding Threat Landscape
How Companies Stop Insider Threats Before They Occur
With insider threats on the rise (up 47% in the last two years), a thorough screening process has become imperative for any new hire. Expanding well beyond a simple ‘check-the-box task,’ screening demands a comprehensive process that uncovers potential indicators of risk and intentions (positive or negative) that a candidate may bring to the organization.…
Read MoreHow to Mitigate Insider Threats with Continuous Monitoring
In this 45-minute webinar, you’ll learn valuable insights including how to:
Read MoreContinuous Monitoring in the Intelligence Cycle
In this whitepaper, learn the elements of continuous monitoring, including:
Read MoreHostile Termination Preparedness
Get a checklist of criteria to consider as you assess your level of preparedness when it comes to terminations, including:
Read MoreWhen Hiring Drivers, Proper Vetting Is Vital For Safety And Compliance
This article was originally featured on securityinformed.com. Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in…
Read More