SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Learn More:
CBC | PANDA SECURITY | INFOSECURITY MAGAZINE | REUTERS
Canadian Desjardins Group hit with a massive insider-caused data breach after an IT
employee stole bank customer information using multiple employees’ credentials.
Lessons Learned:
Protect valuable personally
identifiable information (PII) such
as bank account details using an
ITM platform.
Preventative access controls
aren’t enough to stop credential
sharing.
2
Detection of shared
credential usage and risky
database activity should be
part of your ITM platform.
Compliance is a basic
requirement. Personal
Information Protection and
Electronic Documents Act
(PIPEDA) in Canada applies
to data security.
4.2MCredit Union Members Affected
1.8MCredit Card Holders Affected
$
108MCost to Business
Company: Desjardins Group | Industry: Financial Services | Insider Risk Categories: Database Access Control Issues, Credential Sharing, Malicious Employee
01 02 03 04 05 06 07 08 09 10
01
Easy employee access to sensitive databases and
large-scale credential theft
01 02 03 04 05 06 07 08 09 10
02
Don’t mind me…
just copying some keys
South African Postbank fell victim to a major insider-caused security breach when multiple
employees copied the master encryption key.
Company: Postbank | Industry: Financial Services | Insider Risk Categories: Intentional/Malicious, Employee, Encryption Keys
Learn More:
CPO MAGAZINE | SECURITY BOULEVARD
Lessons Learned:
Robust ITM involves detection,
response and user training to meet
financial compliance requirements.
Time is of the essence when it comes
to alerting, investigating and resolving
insider incidents.
Insider threats don’t always act alone;
sometimes, a group can band together
to execute fraud on a massive scale.
That’s what happened here.
$
3.35MCost of Damages
$
58MCost to Replace Bank Cards
01 02 03 04 05 06 07 08 09 10
03
The case of the
missing trade secrets
Cybereason claimed in 2020 that its former director of product management stole sensitive
intellectual property on his way to a new role at competitor SentinelOne.
Company: Cybereason | Industry: Technology | Insider Risk Categories: Intentional/Malicious, Employee, IP Theft, Privilege Abuse
Learn More:
CRN | SECURITY DISCOUNTS
Lessons Learned:
Senior product managers help
build intellectual property and
trade secrets, and they are high-
risk insiders.
Alerting on early insider threat
indicators—such as copying files
to personal cloud storage or using
USB drives to exfiltrate data—is
key to stopping insider threats.
A robust ITM platform can not only detect
what happened before, during, and after
an insider incident, but also prevent
insiders from covering their tracks.
“Given [his] intimate knowledge of
Cybereason’s products, strategies,
strengths, roadmap, and weaknesses,
and his apparent retention of
proprietary Cybereason documents
and information, his departure
for a competitor in violation of his
employment agreement poses a
grave risk to Cybereason’s future,”
the company wrote in an April 27
filing with the U.S. District Court
in Massachusetts.”
01 02 03 04 05 06 07 08 09 10
04
What happens when security companies
aren’t so secure?
A Trend Micro employee sold data belonging to 68,000 customers to a malicious third
party who used the data for scam phone calls.
Company: Trend Micro | Industry: Technology | Insider Risk Categories: Intentional/Malicious, Employee, Data Exfiltration, Scam, Third Party
Learn More:
THREATPOST | ZDNET | OBSERVEIT
Lessons Learned:
Even security companies are
vulnerable to insider threats. In fact,
no industry or company is immune
to this insidious threat type.
Sensitive data lives in many places
in any given organization, so blocking
is not effective. Alerting and contextual
threat intelligence are key.
Proactivity is of utmost importance.
The last thing an organization wants is to
learn about a breach from its customers.
68KCustomers’ Data Sold for
Scam Phone Calls
01 02 03 04 05 06 07 08 09 10
05
Twitter hacked by
a 17-year-old Floridian
A group of hackers led by a teenager coerced a Twitter employee to give up credentials
for administrative tools, leading to verified account compromises and a Bitcoin scam.
Company: Twitter | Industry: Technology | Insider Risk Categories: Employee, Credential Theft, Social Engineering, Scam, Fraud
Learn More:
NYTIMES | CNN | THE VERGE
Lessons Learned:
Attacks like these can call
reputations into question and spark
debate and scrutiny about the
security and privacy practices of
Twitter and other major services.
Work-from-home policies may be part
of the reason it was so easy for the
scammers to infiltrate and convince
an insider to give up credentials—
a warning for remote teams.
Least-privilege access and careful
monitoring of high-risk, high-privilege
users are key to avoiding a similar
attack at your organization.
$
117KStolen from Customers
01 02 03 04 05 06 07 08 09 10
06
PPE shipments sabotaged
during the COVID-19 crisis
The former VP of finance at Georgia-based Stradis Healthcare sabotaged shipments of
personal protective equipment (PPE) during the early days of U.S. pandemic response
in an apparent act of sabotage.
Company: Stradis | Industry: Healthcare | Insider Risk Categories: Employee, Privilege Abuse, Intentional/Malicious, COVID-19, Revenge
Learn More:
BANKINFOSECURITY | NEWSBREAK
Lessons Learned:
Creation of fake accounts is a key
insider threat indicator that should
be quickly flagged by security
software and reviewed internally.
Employees with a disciplinary history—
especially those involving access and
system abuse—should be flagged
as high-risk and monitored with extra
caution. Revenge is a common motive
for malicious insiders.
Employees with a high level of privilege,
such as a VP of finance, should also
automatically receive more scrutiny
to ensure they do not abuse their
privileges.
$
5KCost to Business
Learn More:
HEALTHITSECURITY | STRAITS TIMES
An IT agency hired by Singapore’s SingHealth caused a data breach involving records for
1.5 million patients by failing to follow security best practices and ignoring warning signs.
Lessons Learned:
1.5MPatients Affected
$
250KCost to SingHealth
$
750KCost to Responsible IT Firm
Company: SingHealth | Industry: Healthcare | Insider Risk Categories: Accidental/Negligent, Third Party, Data Exfiltration, Poor Security Hygiene
01 02 03 04 05 06 07 08 09 10
07
Are you sure you trust
that contract IT team?
SingHealth’s contractor neglected
Singapore’s stringent regulatory
requirements for privacy and security
via the Personal Data Protection Act.
Insider threats can also originate with
third parties, including IT vendors.
Insider threat monitoring must cover
all insiders.
A robust combination of insider threat
technology, security awareness training
and responsible systems management is
required for a complete security strategy.
Learn More:
INFOSECURITY MAGAZINE | BLEEPING COMPUTER
French newspaper Le Figaro’s accidental data leak—caused by a third-party hosting firm’s
poor security hygiene—exposed 7.4 billion records.
Lessons Learned:
Company: Le Figaro | Industry: Media and Communications | Insider Risk Categories: Third Party, Accidental/Negligent, Data Loss
01 02 03 04 05 06 07 08 09 10
08
A newspaper makes headlines—
and not in a good way
Third-party vendors must meet
strict risk assessments before they
are used to store or traffic valuable
information about users.
Attacks often morph from data theft
to more complex and dangerous
attacks that target internal systems,
so it’s key to have early warning
systems in place.
Database leaks are one of the most
common insider threat types, so make
sure yours are properly configured and
that monitoring is in place to detect leaks.
7.4BUser Records Exposed
01 02 03 04 05 06 07 08 09 10
09
Cleanup in the
data security aisle
A senior internal auditor at U.K. grocery chain Morrisons leaked the payroll data of almost
100,000 employees and found himself convicted of fraud in a case that made its way up to
the U.S. Supreme Court.
Company: Morrisons | Industry: Retail | Insider Risk Categories: Employee, Data Exfiltration, Intentional/Malicious, Revenge, Fraud
Lessons Learned:
While Morrisons escaped liability
for its employee’s actions, that is
not always how things play out in
the courts. Insider threats open up
businesses to significant liability.
Implementing an insider threat
detection platform decreases the
odds that an employee can
successfully exfiltrate and expose
sensitive information.
Internal auditors may be thought of as
“watchdogs,” but it’s key to also watch
the watchdogs—who in reality have
massive access and potential for abuse.
£
2MCost to Business
100KEmployees’ Payroll Data Leaked
Learn More:
THE GUARDIAN | NATIONAL LAW REVIEW | INFORMATION AGE
Learn More:
BANKINFOSECURITY
After quitting, a former IT admin at an Atlanta-based building products distributor
committed sabotage by changing router passwords and shutting down the central
command server.
Lessons Learned:
Company: Building Products Distributor | Industry: Manufacturing & Logistics | Insider Risk Categories: Employee, Privileged User, Revenge, Multi-Stage
Sabotage, Intentional/Malicious
01 02 03 04 05 06 07 08 09 10
10
Chaos in the warehouse
Many security tools miss the signs
of insider threat activity, a strong
argument for investing in a purpose-
built ITM solution.
IT managers have significant privileges
and should be considered high-risk
users. ITM tools should be used to
monitor their activities both during and
after employment.
More security precautions should be
implemented around systems and
devices that have the power to bring
a company down—such as central
command servers.
$
800KCost to Business
ABOUT PROOFPOINT
Proofpoint, Inc. (NASDAQ: PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their
users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web. More information is
available at www.proofpoint.com.
©Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. Proofpoint.com
LEGAL DISCLAIMER
This document does not represent legal interpretaion on corporate regulation and policy. Whilst efforts have been made to ensure maximum accuracy, this document does not substitute for the regulation. Only the regulation and its official interpretation can provide complete and definitive information
regarding requirements. This document does not bind ObserveIT, a division of Proofpoint, and does not create any rights, benefits or defenses, substantive or procedural, that are enforceable by any party in any manner.
LEARNMORE
proofpoint.com
08/20

Weitere ähnliche Inhalte

Was ist angesagt?

ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
Charles Lim
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 

Was ist angesagt? (20)

To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
SME Cyber Insurance
SME Cyber Insurance SME Cyber Insurance
SME Cyber Insurance
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 

Ähnlich wie Inside The 10 Biggest and Boldest Insider Threats of 2019-2020

Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
sarah kabirat
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
DFickett
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
jsnyder40
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
galagirishp
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
Henry Worth
 

Ähnlich wie Inside The 10 Biggest and Boldest Insider Threats of 2019-2020 (20)

Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 

Mehr von Proofpoint

Mehr von Proofpoint (7)

2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ... 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
 
Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018
 
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat Report
 
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
 
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital TransformationReinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
 
Adapted from an ESG report - Outnumbered, Outgunned.
Adapted from an ESG report - Outnumbered, Outgunned. Adapted from an ESG report - Outnumbered, Outgunned.
Adapted from an ESG report - Outnumbered, Outgunned.
 
Infographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threatsInfographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threats
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Inside The 10 Biggest and Boldest Insider Threats of 2019-2020

  • 1.
  • 2. Learn More: CBC | PANDA SECURITY | INFOSECURITY MAGAZINE | REUTERS Canadian Desjardins Group hit with a massive insider-caused data breach after an IT employee stole bank customer information using multiple employees’ credentials. Lessons Learned: Protect valuable personally identifiable information (PII) such as bank account details using an ITM platform. Preventative access controls aren’t enough to stop credential sharing. 2 Detection of shared credential usage and risky database activity should be part of your ITM platform. Compliance is a basic requirement. Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada applies to data security. 4.2MCredit Union Members Affected 1.8MCredit Card Holders Affected $ 108MCost to Business Company: Desjardins Group | Industry: Financial Services | Insider Risk Categories: Database Access Control Issues, Credential Sharing, Malicious Employee 01 02 03 04 05 06 07 08 09 10 01 Easy employee access to sensitive databases and large-scale credential theft
  • 3. 01 02 03 04 05 06 07 08 09 10 02 Don’t mind me… just copying some keys South African Postbank fell victim to a major insider-caused security breach when multiple employees copied the master encryption key. Company: Postbank | Industry: Financial Services | Insider Risk Categories: Intentional/Malicious, Employee, Encryption Keys Learn More: CPO MAGAZINE | SECURITY BOULEVARD Lessons Learned: Robust ITM involves detection, response and user training to meet financial compliance requirements. Time is of the essence when it comes to alerting, investigating and resolving insider incidents. Insider threats don’t always act alone; sometimes, a group can band together to execute fraud on a massive scale. That’s what happened here. $ 3.35MCost of Damages $ 58MCost to Replace Bank Cards
  • 4. 01 02 03 04 05 06 07 08 09 10 03 The case of the missing trade secrets Cybereason claimed in 2020 that its former director of product management stole sensitive intellectual property on his way to a new role at competitor SentinelOne. Company: Cybereason | Industry: Technology | Insider Risk Categories: Intentional/Malicious, Employee, IP Theft, Privilege Abuse Learn More: CRN | SECURITY DISCOUNTS Lessons Learned: Senior product managers help build intellectual property and trade secrets, and they are high- risk insiders. Alerting on early insider threat indicators—such as copying files to personal cloud storage or using USB drives to exfiltrate data—is key to stopping insider threats. A robust ITM platform can not only detect what happened before, during, and after an insider incident, but also prevent insiders from covering their tracks. “Given [his] intimate knowledge of Cybereason’s products, strategies, strengths, roadmap, and weaknesses, and his apparent retention of proprietary Cybereason documents and information, his departure for a competitor in violation of his employment agreement poses a grave risk to Cybereason’s future,” the company wrote in an April 27 filing with the U.S. District Court in Massachusetts.”
  • 5. 01 02 03 04 05 06 07 08 09 10 04 What happens when security companies aren’t so secure? A Trend Micro employee sold data belonging to 68,000 customers to a malicious third party who used the data for scam phone calls. Company: Trend Micro | Industry: Technology | Insider Risk Categories: Intentional/Malicious, Employee, Data Exfiltration, Scam, Third Party Learn More: THREATPOST | ZDNET | OBSERVEIT Lessons Learned: Even security companies are vulnerable to insider threats. In fact, no industry or company is immune to this insidious threat type. Sensitive data lives in many places in any given organization, so blocking is not effective. Alerting and contextual threat intelligence are key. Proactivity is of utmost importance. The last thing an organization wants is to learn about a breach from its customers. 68KCustomers’ Data Sold for Scam Phone Calls
  • 6. 01 02 03 04 05 06 07 08 09 10 05 Twitter hacked by a 17-year-old Floridian A group of hackers led by a teenager coerced a Twitter employee to give up credentials for administrative tools, leading to verified account compromises and a Bitcoin scam. Company: Twitter | Industry: Technology | Insider Risk Categories: Employee, Credential Theft, Social Engineering, Scam, Fraud Learn More: NYTIMES | CNN | THE VERGE Lessons Learned: Attacks like these can call reputations into question and spark debate and scrutiny about the security and privacy practices of Twitter and other major services. Work-from-home policies may be part of the reason it was so easy for the scammers to infiltrate and convince an insider to give up credentials— a warning for remote teams. Least-privilege access and careful monitoring of high-risk, high-privilege users are key to avoiding a similar attack at your organization. $ 117KStolen from Customers
  • 7. 01 02 03 04 05 06 07 08 09 10 06 PPE shipments sabotaged during the COVID-19 crisis The former VP of finance at Georgia-based Stradis Healthcare sabotaged shipments of personal protective equipment (PPE) during the early days of U.S. pandemic response in an apparent act of sabotage. Company: Stradis | Industry: Healthcare | Insider Risk Categories: Employee, Privilege Abuse, Intentional/Malicious, COVID-19, Revenge Learn More: BANKINFOSECURITY | NEWSBREAK Lessons Learned: Creation of fake accounts is a key insider threat indicator that should be quickly flagged by security software and reviewed internally. Employees with a disciplinary history— especially those involving access and system abuse—should be flagged as high-risk and monitored with extra caution. Revenge is a common motive for malicious insiders. Employees with a high level of privilege, such as a VP of finance, should also automatically receive more scrutiny to ensure they do not abuse their privileges. $ 5KCost to Business
  • 8. Learn More: HEALTHITSECURITY | STRAITS TIMES An IT agency hired by Singapore’s SingHealth caused a data breach involving records for 1.5 million patients by failing to follow security best practices and ignoring warning signs. Lessons Learned: 1.5MPatients Affected $ 250KCost to SingHealth $ 750KCost to Responsible IT Firm Company: SingHealth | Industry: Healthcare | Insider Risk Categories: Accidental/Negligent, Third Party, Data Exfiltration, Poor Security Hygiene 01 02 03 04 05 06 07 08 09 10 07 Are you sure you trust that contract IT team? SingHealth’s contractor neglected Singapore’s stringent regulatory requirements for privacy and security via the Personal Data Protection Act. Insider threats can also originate with third parties, including IT vendors. Insider threat monitoring must cover all insiders. A robust combination of insider threat technology, security awareness training and responsible systems management is required for a complete security strategy.
  • 9. Learn More: INFOSECURITY MAGAZINE | BLEEPING COMPUTER French newspaper Le Figaro’s accidental data leak—caused by a third-party hosting firm’s poor security hygiene—exposed 7.4 billion records. Lessons Learned: Company: Le Figaro | Industry: Media and Communications | Insider Risk Categories: Third Party, Accidental/Negligent, Data Loss 01 02 03 04 05 06 07 08 09 10 08 A newspaper makes headlines— and not in a good way Third-party vendors must meet strict risk assessments before they are used to store or traffic valuable information about users. Attacks often morph from data theft to more complex and dangerous attacks that target internal systems, so it’s key to have early warning systems in place. Database leaks are one of the most common insider threat types, so make sure yours are properly configured and that monitoring is in place to detect leaks. 7.4BUser Records Exposed
  • 10. 01 02 03 04 05 06 07 08 09 10 09 Cleanup in the data security aisle A senior internal auditor at U.K. grocery chain Morrisons leaked the payroll data of almost 100,000 employees and found himself convicted of fraud in a case that made its way up to the U.S. Supreme Court. Company: Morrisons | Industry: Retail | Insider Risk Categories: Employee, Data Exfiltration, Intentional/Malicious, Revenge, Fraud Lessons Learned: While Morrisons escaped liability for its employee’s actions, that is not always how things play out in the courts. Insider threats open up businesses to significant liability. Implementing an insider threat detection platform decreases the odds that an employee can successfully exfiltrate and expose sensitive information. Internal auditors may be thought of as “watchdogs,” but it’s key to also watch the watchdogs—who in reality have massive access and potential for abuse. £ 2MCost to Business 100KEmployees’ Payroll Data Leaked Learn More: THE GUARDIAN | NATIONAL LAW REVIEW | INFORMATION AGE
  • 11. Learn More: BANKINFOSECURITY After quitting, a former IT admin at an Atlanta-based building products distributor committed sabotage by changing router passwords and shutting down the central command server. Lessons Learned: Company: Building Products Distributor | Industry: Manufacturing & Logistics | Insider Risk Categories: Employee, Privileged User, Revenge, Multi-Stage Sabotage, Intentional/Malicious 01 02 03 04 05 06 07 08 09 10 10 Chaos in the warehouse Many security tools miss the signs of insider threat activity, a strong argument for investing in a purpose- built ITM solution. IT managers have significant privileges and should be considered high-risk users. ITM tools should be used to monitor their activities both during and after employment. More security precautions should be implemented around systems and devices that have the power to bring a company down—such as central command servers. $ 800KCost to Business
  • 12. ABOUT PROOFPOINT Proofpoint, Inc. (NASDAQ: PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web. More information is available at www.proofpoint.com. ©Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. Proofpoint.com LEGAL DISCLAIMER This document does not represent legal interpretaion on corporate regulation and policy. Whilst efforts have been made to ensure maximum accuracy, this document does not substitute for the regulation. Only the regulation and its official interpretation can provide complete and definitive information regarding requirements. This document does not bind ObserveIT, a division of Proofpoint, and does not create any rights, benefits or defenses, substantive or procedural, that are enforceable by any party in any manner. LEARNMORE proofpoint.com 08/20