01.08.2019 Views

Cyber Defense eMagazine August 2019

Cyber Defense eMagazine August Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine August Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

8. Spread the knowledge: Small- and medium-sized businesses are typically working with a<br />

strained budget and limited resources, so a fully dedicated insider threat team – while ideal – isn’t<br />

always realistic. While your security and IT team should be able to handle the monitoring,<br />

detection and remediation responsibilities, they shouldn’t have to shoulder the full burden.<br />

Educating and training your stakeholders on the full scope of the insider threat program will prove<br />

critical so that they have a clearer understanding of what’s being monitored, specific case triggers,<br />

key workflows, rules of engagement and the tools needed to accomplish all of this. This training<br />

should also clearly define roles and responsibilities in the event of a triggered workflow.<br />

9. Open the lines of communication: In order to maintain a healthy working relationship between<br />

your employees and your security/IT teams, it’s critical to communicate that your organization<br />

tracks file activity. Reiterate that the program is applicable to everyone – without privileges or<br />

exceptions – and is designed to maintain employee productivity, while protecting the<br />

organization’s most valuable assets – its data.<br />

10. Start now before it’s too late: The most successful insider threat program starts long before a<br />

trigger. A trigger event shouldn’t be the reason why you’re implementing your monitoring,<br />

detection and remediation technologies. A strong insider threat program continuously runs and<br />

provides context and complete visibility into all data activity at all times.<br />

The industry needs to stop seeing insider threats as “employees stealing stuff” when in reality, it’s about<br />

the actions (good, bad, indifferent) that people take with any kind of data that puts the customers,<br />

employees, partner or company’s well-being at risk. Initiating an insider threat program with a simpler,<br />

workflow-based starting point around three to four high-risk triggers can effectively address 80 percent<br />

or more of your risks to insider threat.<br />

About the Author<br />

As vice president of portfolio marketing at Code42, Mark leads the<br />

market research, competitive intelligence and product marketing<br />

teams. Mark joined Code42 in 2016 bringing more than 20 years of<br />

B2B data storage, cloud and data security experience with him,<br />

including several roles in marketing and product management at<br />

Seagate.<br />

67

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!