Page 44 - Cyber Defense eMagazine for July 2020
P. 44

Is Proactive Insider Risk Mitigation Possible?


             Why Companies Need More Than Technical Indicators to Identify Their Biggest Threats Before They
                                                          Do Harm

                             By David A. Sanders, Director of Insider Threat Operations, Haystax


            Most  corporate  insider  threat  programs  are  structured  and  equipped  to  mitigate  adverse  events
            perpetrated by trusted insiders only after they have occurred. But proactive insider risk management is
            possible – and it starts with a robust approach to detection.

            Consider this scenario, based on a real-life case, in which a concerning insider threat event turns out to
            be more complicated than expected:
                   John commented to other employees that it would be easy to take down the new cloud services
                   his company recently migrated to from their on-premises systems. The employees reported the
                   comment to their manager, who reported it to human resources and ultimately the company’s
                   insider  threat  program.  An  investigation  revealed  that  John  was  angry  because  his  role  had
                   changed with the new architecture. In addition, he was clinically depressed, off medication and
                   had  suicidal thoughts.  The  investigative results prompted  a  coordinated  response  among the
                   insider threat program, security, legal and human resources. The threat was mitigated, with the
                   final step of referring John to the employee assistance program.

            Because the  insider  threat  team  was  notified  about  one  behavioral  indicator  of  a  high-impact  event,
            additional indicators were gathered and assessed to determine that John was a potential threat to the
            company and to himself. In doing so, the company was able to intervene and proactively mitigate an
            insider threat event before it occurred. The resulting cost and impact were minimal. By contrast, the
            projected cost and impact of the cloud services being taken off-line for one day were very high.







            Cyber Defense eMagazine –July 2020 Edition                                                                                                                                                                                                                         44
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   39   40   41   42   43   44   45   46   47   48   49