CS Talks: How to shut down insider threats
Cyber Security Hub explores how to best approach cyber threats that come from employees
Why cyber security professionals should not just be considering external threats in their incident response plans with Robin Smith, CISO at Aston Martin-Lagonda
As the external threat landscape evolves and expands, cyber security professionals must also consider the threats they face from within their organization. With Cyber Security Hub finding that 28 percent of cyber security professionals say that they struggle with a lack of visbility on threats, it is vital that all vectors are recognised.
Insider threats can encompass a range of threat vectors from data theft to network infiltration, malicious software uploads and unauthorized credential sharing. Insider threats can also come from a range of sources, from regular employees to those with privileged access or third-party suppliers to a business. Each of these insider threats carries with it unique challenges meaning each must be approached and mitigated in a different way.
These threats can have both an operational and financial impact on business, with research by the Ponemon Institute finding that the average global cost of insider threats is US$15.4 million.
It is important for cyber security leaders to collaborate with others within their business when approaching insider threats, as well as having a proactive incident response plan in place.
Join CS Talks: How to approach insider threats with corporate diligence for an in-depth discussion on how to prevent and respond to insider threats in a proactive manner.
Speaker