Data Breach , Data Breach Prevention and Response Summit , Events

Using Data to Thwart the Insider Threat
Using Data to Thwart the Insider Threat

Despite significant cybersecurity investments, the record number of new breaches are proof we cannot solve our security problems by adding more technology. Simply increasing your security budget won't prevent data breaches stemming from accidental, compromised and malicious insiders.

See Also: Effective Cyber Threat Hunting Requires an Actor and Incident Centric Approach

Build an Insider Threat Program around 3 pillars:

  • People - Identify insider threat problem , Build Legal/HR coalition, IS policy & strategy review
  • Technology - Define requirements and used cases , Risk Assessment and Prove theory
  • Process - Learn normal behavior, Identifier outliers, Risk scoring - threat vs. asset

Around the Network