01.08.2019 Views

Cyber Defense eMagazine August 2019

Cyber Defense eMagazine August Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine August Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

10 Steps to Kicking Off Your Insider Threat Program<br />

By Mark Wojtasiak, vice president, Code42<br />

Malware, ransomware and other external cyber threats are usually the security threats that grab the most<br />

headlines. You might be surprised to know that insider threats are one of the largest unsolved issues in<br />

cybersecurity, according to McKinsey. A staggering half of all data breaches between 2012 and 2017<br />

were derivative of some insider threat element. And in the last month alone, we’ve seen three high profile<br />

cases of employees stealing sensitive information from McAfee, Desjardins Bank and SunPower Corp.<br />

However, while businesses know they have to address this looming risk, they’re often stuck trying to<br />

figure out, “Where do we start?”<br />

Sure, it’s easy to just say, “build a comprehensive insider threat program,” but that’s daunting, timeconsuming,<br />

expensive and complex. Building an insider threat program goes far and beyond “best<br />

practices.” It usually involves an entire team dedicated exclusively to insider threat detection and<br />

response, which sounds nice, but not realistic for those security teams working with a tight budget and<br />

limited team resources.<br />

65

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!