SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
About : Insider Threats
• You might have heard of the threats that are built into machines, and the ones that are created by
people to exploit loopholes in any given system.
• We're all aware of the malwares and viruses, the phishing sites, fake accounts, and everything
digital threat that exists in this day and age.
• But let’s throw it back to the classics for a bit to tackle on the still existing grave threat, and
probably the most dangerous of them all: insider threats.
• That's right; there isn't a code, a program, software or data cache that's more dangerous than a
human mind.
www.izoologic.com
About : Insider Threats
Since the dawn of time, for every great
creation that works using a system (the
calendar, a government, the multiplication
table), there have been minds who have been
able to see the limits and deduce the
effectiveness of each.
Fast forward to thousands of years of human
development, and this still holds true.
Cryptocurrency, the latest trend, has its own
digital demons to exorcise, but its greatest
adversary is still the human mind with evil
intent.
www.izoologic.com
Insider Threats
www.izoologic.com
CA Technologies put up a report regarding
insider threats, or the classy, Ocean's Eleven
way of doing things, led by Holger Schulze,
CEO and Founder of Cybersecurity Insiders, a
group dedicated to the investigation of
malicious insiders, and negligent ones.
Simply put, insiders can either know or do not
know that they're being a threat to
cybersecurity.
www.izoologic.com
Insider Threats
This is done, how, you ask?
• Well, every villainous group has a mastermind. That's where it all begins.
• An employee, executive, or a co-owner of any business can jeopardize the security of the
company, and this mastermind is doing it willingly, most likely due to greater ambition.
• Of course, taking over an empire is no easy task, and is not something you can do without allies.
• So, the next tier of insiders comes to play: the major players.
• These are carefully planted moles in every department, equipped with the necessary skill, title
and ambition to participate in such a risky activity.
• Lastly, a scheme will never be complete without its most prominent performer: the pawns.
• These are the ones that are either in the loop but too incompetent for a bigger role, or the people
who have no idea that they're participating in something of the sort.
Insider Threats
CA ran a survey spanning 400,000 members of the online
community, with Cybersecurity Insiders, in partnership
with the Information Security Community on LinkedIn to
conduct an in-depth study of cybersecurity professionals to
gather fresh insights, reveal the latest trends and provide
actionable guidance on addressing insider threat.
Below are the key takeaways on the survey:
www.izoologic.com
• 90% of organizations feel vulnerable to insider attacks.
• The main enabling risk factors include too many users with excessive access privileges (37%), an increasing number of
devices with access to sensitive data (36%), and the increasing complexity of information technology (35%).
• A majority of 53% confirmed insider attacks against their organization in the previous 12 months (typically less than five
attacks).
• 27% of organizations say insider attacks have become more frequent. Organizations are shifting their focus on detection
of insider threats (64%), followed by deterrence methods (58%) and analysis and post breach forensics (49%).
• The use of user behaviour monitoring is accelerating; 94% of organizations deploy some method of monitoring users
and 93% monitor access to sensitive data.
Insider Threats
www.izoologic.com
The most popular technologies to deter insider threats are :
• Data Loss Prevention (DLP), encryption, and identity and access management
solutions.
• To better detect active insider threats, companies deploy Intrusion Detection and
Prevention (IDS), log management and SIEM platforms.
• Lastly, the vast majority (86%) of organizations already have or are building an
insider threat program.
• Thirty-six percept have a formal program in place to respond to insider attacks,
while 50% are focused on developing their program.
Insider Threats
www.izoologic.com
The types of insiders that pose the biggest risk to organizations are
somewhat expected, but with an asterisk.
1. For example, 56% of the mitigated risk of insider threat comes from regular employees,
most likely out of neglect, or what we call the accidental/unintentional insider.
2. 55% of the mitigated risk comes from privileged IT users/admins, with access to more
confidential data as their tier goes higher and is a mix of the unintentional and the
malicious kind of insider.
3. Temporary workers, contractors and service providers generate 42% of the mitigated risk
and is also a combination of unintentional and malicious.
www.izoologic.com
Insider Threats
The kind of data most vulnerable to insiders, with a percentage value on
mitigated risk are:
• 57% on confidential business information (customer data, financial reports, employee data
• 52% on privileged account information (credentials, passwords, security codes)
• 49% on sensitive personal information (what you did last summer, personal identifiable
information)
• 32% on intellectual property (trade secrets, products in development, designs and
blueprints)
• 27% on operational or infrastructure data (network topology and infrastructure, methods
of wresting control)
Insider Threats
1. Most of these data can be accessed on several platforms, but the most common sources
that insiders can get these from are Databases, file servers, cloud applications,
endpoints, business applications, the active directory, the physical network, and mobile
devices.
2. Accidental insiders get involved primarily through phishing attempts, weak passwords,
unlocked devices, password sharing and unsecured networking.
3. Among the organizations participating in the survey, 34% consider external attacks
(hacking, defacing) as the most likely insider threat to happen to their organization,
while 36% believe that they are more prone to a deliberate attack, and 30% would like to
write it off towards accidental/unintentional breach of security.
Insider Threats
While this is somewhat a difficult way to breach Cyber Security, it’s still the most effective
way, and the human mind is greater than any machine, hence, this is a problem that's going
to exist for a while.
Insider Threats
Contact Us
14 Hanover Street, W1S 1YH City of Westminster, London
UNITED KINGDOM
+44 20 3734 2726
info@izoologic.com
www.izoologic.com

Weitere ähnliche Inhalte

Was ist angesagt?

Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security Attacks
Tripwire
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015
Mark Lanterman
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
Charles Lim
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
Ward Pyles
 

Was ist angesagt? (20)

CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security Attacks
 
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
 
Top 6 Sources for Identifying Threat Actor TTPs
Top 6 Sources for Identifying Threat Actor TTPsTop 6 Sources for Identifying Threat Actor TTPs
Top 6 Sources for Identifying Threat Actor TTPs
 
Threat Modelling And Threat Response
Threat Modelling And Threat ResponseThreat Modelling And Threat Response
Threat Modelling And Threat Response
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_training
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
6 Ways to Deceive Cyber Attackers
6 Ways to Deceive Cyber Attackers6 Ways to Deceive Cyber Attackers
6 Ways to Deceive Cyber Attackers
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
Threat Intelligence Tweaks That'll Take Your Security to the Next Level
Threat Intelligence Tweaks That'll Take Your Security to the Next LevelThreat Intelligence Tweaks That'll Take Your Security to the Next Level
Threat Intelligence Tweaks That'll Take Your Security to the Next Level
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
A field guide to insider threat helps manage the risk
A field guide to insider threat helps manage the riskA field guide to insider threat helps manage the risk
A field guide to insider threat helps manage the risk
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 

Ähnlich wie Insider threats

SOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptxSOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
TamaOlan1
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
Russell Publishing
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
galagirishp
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
banerjeea
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
Shallu Behar-Sheehan FCIM
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
ramsetl
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
shreemala1
 

Ähnlich wie Insider threats (20)

SOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptxSOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
 
13734729.ppt
13734729.ppt13734729.ppt
13734729.ppt
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 

Kürzlich hochgeladen

Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 

Kürzlich hochgeladen (20)

Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 

Insider threats

  • 1. About : Insider Threats • You might have heard of the threats that are built into machines, and the ones that are created by people to exploit loopholes in any given system. • We're all aware of the malwares and viruses, the phishing sites, fake accounts, and everything digital threat that exists in this day and age. • But let’s throw it back to the classics for a bit to tackle on the still existing grave threat, and probably the most dangerous of them all: insider threats. • That's right; there isn't a code, a program, software or data cache that's more dangerous than a human mind. www.izoologic.com
  • 2. About : Insider Threats Since the dawn of time, for every great creation that works using a system (the calendar, a government, the multiplication table), there have been minds who have been able to see the limits and deduce the effectiveness of each. Fast forward to thousands of years of human development, and this still holds true. Cryptocurrency, the latest trend, has its own digital demons to exorcise, but its greatest adversary is still the human mind with evil intent. www.izoologic.com
  • 3. Insider Threats www.izoologic.com CA Technologies put up a report regarding insider threats, or the classy, Ocean's Eleven way of doing things, led by Holger Schulze, CEO and Founder of Cybersecurity Insiders, a group dedicated to the investigation of malicious insiders, and negligent ones. Simply put, insiders can either know or do not know that they're being a threat to cybersecurity.
  • 4. www.izoologic.com Insider Threats This is done, how, you ask? • Well, every villainous group has a mastermind. That's where it all begins. • An employee, executive, or a co-owner of any business can jeopardize the security of the company, and this mastermind is doing it willingly, most likely due to greater ambition. • Of course, taking over an empire is no easy task, and is not something you can do without allies. • So, the next tier of insiders comes to play: the major players. • These are carefully planted moles in every department, equipped with the necessary skill, title and ambition to participate in such a risky activity. • Lastly, a scheme will never be complete without its most prominent performer: the pawns. • These are the ones that are either in the loop but too incompetent for a bigger role, or the people who have no idea that they're participating in something of the sort.
  • 5. Insider Threats CA ran a survey spanning 400,000 members of the online community, with Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends and provide actionable guidance on addressing insider threat. Below are the key takeaways on the survey: www.izoologic.com
  • 6. • 90% of organizations feel vulnerable to insider attacks. • The main enabling risk factors include too many users with excessive access privileges (37%), an increasing number of devices with access to sensitive data (36%), and the increasing complexity of information technology (35%). • A majority of 53% confirmed insider attacks against their organization in the previous 12 months (typically less than five attacks). • 27% of organizations say insider attacks have become more frequent. Organizations are shifting their focus on detection of insider threats (64%), followed by deterrence methods (58%) and analysis and post breach forensics (49%). • The use of user behaviour monitoring is accelerating; 94% of organizations deploy some method of monitoring users and 93% monitor access to sensitive data. Insider Threats www.izoologic.com
  • 7. The most popular technologies to deter insider threats are : • Data Loss Prevention (DLP), encryption, and identity and access management solutions. • To better detect active insider threats, companies deploy Intrusion Detection and Prevention (IDS), log management and SIEM platforms. • Lastly, the vast majority (86%) of organizations already have or are building an insider threat program. • Thirty-six percept have a formal program in place to respond to insider attacks, while 50% are focused on developing their program. Insider Threats www.izoologic.com
  • 8. The types of insiders that pose the biggest risk to organizations are somewhat expected, but with an asterisk. 1. For example, 56% of the mitigated risk of insider threat comes from regular employees, most likely out of neglect, or what we call the accidental/unintentional insider. 2. 55% of the mitigated risk comes from privileged IT users/admins, with access to more confidential data as their tier goes higher and is a mix of the unintentional and the malicious kind of insider. 3. Temporary workers, contractors and service providers generate 42% of the mitigated risk and is also a combination of unintentional and malicious. www.izoologic.com Insider Threats
  • 9. The kind of data most vulnerable to insiders, with a percentage value on mitigated risk are: • 57% on confidential business information (customer data, financial reports, employee data • 52% on privileged account information (credentials, passwords, security codes) • 49% on sensitive personal information (what you did last summer, personal identifiable information) • 32% on intellectual property (trade secrets, products in development, designs and blueprints) • 27% on operational or infrastructure data (network topology and infrastructure, methods of wresting control) Insider Threats
  • 10. 1. Most of these data can be accessed on several platforms, but the most common sources that insiders can get these from are Databases, file servers, cloud applications, endpoints, business applications, the active directory, the physical network, and mobile devices. 2. Accidental insiders get involved primarily through phishing attempts, weak passwords, unlocked devices, password sharing and unsecured networking. 3. Among the organizations participating in the survey, 34% consider external attacks (hacking, defacing) as the most likely insider threat to happen to their organization, while 36% believe that they are more prone to a deliberate attack, and 30% would like to write it off towards accidental/unintentional breach of security. Insider Threats
  • 11. While this is somewhat a difficult way to breach Cyber Security, it’s still the most effective way, and the human mind is greater than any machine, hence, this is a problem that's going to exist for a while. Insider Threats
  • 12. Contact Us 14 Hanover Street, W1S 1YH City of Westminster, London UNITED KINGDOM +44 20 3734 2726 info@izoologic.com www.izoologic.com