01.08.2019 Views

Cyber Defense eMagazine August 2019

Cyber Defense eMagazine August Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine August Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The complexity doesn’t stop there. The root of this approach is – dare I say it – legacy data loss<br />

prevention. Its ‘prevention-first’ approach and rigid policies frustrate users with barriers to productivity<br />

which, most of the time, lead to workarounds and loopholes.<br />

This is doing your organization and employees more harm than good. We all need something simpler<br />

because insider threats show no signs of diminishing.<br />

Here are 10 critical steps that make it faster, easier and more cost-effective to build your insider threat<br />

program:<br />

1. Get leadership buy-in: This might seem like a no-brainer, but it’s critical to the development of<br />

your security and IT team (and your future efforts) as value-adding business partners.<br />

2. Engage your stakeholders: The buy-in campaign doesn’t stop with the executive team. Think<br />

about the individuals that would lose the most if an insider threat event were to take place, and<br />

bring them into the fold from the start.<br />

3. Know what data is most valuable: You should have a pretty sound idea of what data is most<br />

valuable after speaking with leadership and line-of-business stakeholders. You might be thinking,<br />

“all data has value,” which is true, but these conversations will be essential to learning about the<br />

types of unstructured data to keep a watchful eye on, and which types of high-value unstructured<br />

data will require more creative means of tracking.<br />

4. Put yourself in the shoes of an insider: Think critically about the value in taking or moving<br />

information. What would they do with it? What tactics or workarounds might they employ to help<br />

them get the job done?<br />

Seem straightforward? Up until this point, you should be determining the types of data you’re protecting<br />

and understanding the key indicators that might point to insider incidents. Keep reading – here’s where<br />

things get simpler.<br />

5. Determine common, everyday insider triggers: Don’t get wrapped up in building a robust<br />

program with different types of classification schemes and policies that try to monitor every<br />

possible scenario. Instead, focus on your “foundational triggers,” or most common use cases that<br />

make up the vast majority of insider threat incidents, such as departing employees à la McAfee,<br />

high-risk employees, accidental leakage and organizational changes.<br />

6. Create consistent workflows: Investigating suspected data exfiltration can be complex and time<br />

consuming, so it’s important to define the key workflows for each foundational trigger. For<br />

example, when an employee departure is triggered, make sure you clearly define the<br />

workflow/plan of attack for this trigger and consistently execute on the steps you’ve established.<br />

7. Establish a game plan: Once a workflow is triggered and potential data exfiltration identified,<br />

establish which key stakeholder is responsible for directly engaging with the employee/actor.<br />

Using the employee departure example again, this would likely trigger engagement from HR and<br />

the line-of-business manager. This clear line of communication not only separates security and<br />

IT teams from the “data police” reputation, but also allows them to focus on data monitoring,<br />

detection and remediation.<br />

66

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!