Friday Quick-Take: Stopping Insider Threats
“Insider threat” is no longer just a security buzzword; it has become an enterprise concern commanding executive-level attention. In government, devastating data disclosures by the likes of Edward Snowden and Chelsea (Bradley) Manning have brought attention to the reality that malicious actions by trusted employees within an organization can undermine that organization’s security and jeopardize national security. Insider attacks at private sector entities including Morgan Stanley, Monsanto, and Reuters have had consequences impacting those organizations’ customers, employees, operations, reputation, and bottom line.
At its core, the insider threat is an Identity Management issue: malicious insiders, by definition, have been granted some level of authorized access and are therefore often harder to detect than bright-line cases of unauthorized access or intrusion. As addressed in this paper, many organizations’ vulnerability to insider attack stems from gaps in their Identity Management approach. These gaps can be mitigated by embracing a complete Identity Management strategy, rooted in governance, which can protect against the full range of insider attacks.
Get the full guide on stopping insider threats by downloading our white paper, Stopping Insider Threats with a Complete Identity Management Strategy.