Keep up with the changing nature of employee and contractor risk within
your agency
Insider threats are often discovered only after the fact. Predicting risks, especially from malicious attacks, is critical to insider threat program success. Yet malicious incidents persist, representing 37% of all insider threat events.1 Agencies can bolster insider threat programs with new data to identity potentially malicious risks before they occur.
Chris Cummiskey, Former Acting Undersecretary for Management at DHS, discusses how to recognize insider threats.
Completely preventing insider threats is virtually impossible.
However, with a strong insider threat program, reducing risk can
be accomplished.
To implement a complete insider threat program, agencies should adopt a data collection and monitoring framework that includes the following:
Organizational Processes
Helps detect suspect attitudes and behaviors
Internal information
Helps identity suspect use of internal data and resources
External information
Helps uncover at-risk individuals and suspect associations
Using this framework enables agencies and contractors to better identify insiders who should be considered for threat evaluation and investigation.
Enhance Insider Threat Programs
With Comprehensive Data
Get an in-depth look into insider threats
and how to improve protection
for your organization and employees
Oct. 28, 2020 - Federal News Network
An unexpected danger: COVID-19 puts government clearances at risk
Sept. 25, 2020 - Nextgov
Addressing Insider Threats with Event Triggers
Aug 5, 2020 - Government Computer News
How financial triggers can help spot insider threats
Mar. 19, 2020 - Gov Cybersecurity Hub
TransUnion shares the warning signs and financial impact of an insider threat
Sorry, nothing matches the filters you selected