Keep up with the changing nature of employee and contractor risk within
Insider threats are often discovered only after the fact. Current and former employees, contractors and business partners may pose a risk of cybercrime and fraud. It's difficult to detect insider threats, but the issue is real. In fact, 29% of IT leaders believe that cybercrimes are most costly and damaging when caused by insiders.* What's at stake is data security, operational integrity and possible fraud. Agencies need new ways to identify potentially malicious insider threat behaviors.
of IT Leaders believe Insider cybercrime
is the most costly and damaging1
1 Source: The 2017 U.S. State of Cybercrime Survey, in partnership with Forcepoint, CSO, U.S. Secret Service, and CERT Division of Software Engineering Institute at Carnegie Mellon University
Chris Cummiskey, Former Acting Undersecretary for Management at DHS, discusses how to recognize insider threats.
Completely preventing insider threats is virtually impossible.
However, with a strong insider threat program, reducing risk can be accomplished.
To implement a complete insider threat program, agencies should adopt a data collection and monitoring framework that includes the following:
Helps detect suspect attitudes and behaviors
Helps identity suspect use of internal data and resources
Helps uncover at-risk individuals and suspect associations
Using this framework enables agencies and contractors to better identify insiders who should be considered for threat evaluation and investigation.
TransUnion’s insider threat insights help public sector agency leaders detect potential risks
Event-driven Continuous Evaluation for Personnel with Security Clearances
Read about a functional architecture for a CE system for public sector, and explore how to facilitate routine evaluation of security clearance holders. Learn about the applicable laws and regulations surrounding CE issues.
Better Understand Your Workforce to Detect Potential Threats Before They Happen
Learn methods to detect insider threats and how to use big data to identify employees who may be at risk or are exhibiting suspicious behavior.
Mitigate Agency Risk with Extended Enterprise Risk Management
Learn why public sector agencies need to take a broad approach to protect against threats. A panel of experts discusses how extended-enterprise risk management techniques can proactively mitigate risks or help you respond immediately to reduce financial impact.
Aug. 21, 2019
How to Effectively Use Data to Catch Insider Threats in Trusted Workforce 2.0 – Homeland Security Today
May 30, 2019
How a New Partnership is Helping to Identify Insider Threats Before They Happen – ClearanceJobs
Dec. 4, 2018
Covering all the bases in the fight against insider threats – Federal News Network
Sorry, nothing matches the filters you selected