Keep up with the changing nature of employee and contractor risk within
Insider threats are often discovered only after the fact. Predicting risks, especially from malicious attacks, is critical to insider threat program success. Yet malicious incidents persist, representing 37% of all insider threat events.1 Agencies can bolster insider threat programs with new data to identity potentially malicious risks before they occur.
Chris Cummiskey, Former Acting Undersecretary for Management at DHS, discusses how to recognize insider threats.
Completely preventing insider threats is virtually impossible.
However, with a strong insider threat program, reducing risk can be accomplished.
To implement a complete insider threat program, agencies should adopt a data collection and monitoring framework that includes the following:
Helps detect suspect attitudes and behaviors
Helps identity suspect use of internal data and resources
Helps uncover at-risk individuals and suspect associations
Using this framework enables agencies and contractors to better identify insiders who should be considered for threat evaluation and investigation.
TransUnion’s insights help public sector agency leaders build effective insider threat programs
Better Data Protects Against Insider Threat
Comprehensive insider threat programs take advantage of external data
Use Device Intelligence to Combat Cyber Threats
Learn how device data can improve identity verification and authentication
Sorry, nothing matches the filters you selected