Mitigating Insider Threats - a Technical Perspective

Mitigating Insider Threats - a Technical Perspective

After people and process, another way to combat the insider threat is from a technology perspective and look at the various devices that can be leveraged to reduce this threat. 

Insiders are tricky because they represent a demographic that is largely trusted; employees have presumably been vetted and gone through the HR process; they have been interviewed by managers and potential colleagues to assess their knowledge and capabilities; and if to be engaged in work in support of the government, have obtained some level of clearance for access to classified information, networks, and systems.  The incidents with Chelsea Manning and Edward Snowden have revealed just how damaging an insider can be in obtaining and making public highly sensitive information. 

Data leakage is but one possible consequence resulting from the efforts of these individuals. Data and network destruction, disruption, and data manipulation are all possible alternatives depending on the level of malicious intent. Given the recent events involving the use of ransomware to encrypt hospital networks, it’s easy to see how direct access to networks could enable hostile insiders to inserting this type of malware into a network and holding it for considerable ransom. 

(Read More)

Kyle Brennan

Federal Sales Manager/FSO at Thinklogical, A Belden Brand

8 年

Couldn't agree more with your statement Brian: "Best practices toward mitigating data loss is to protect information at its source." Mitigate the threat with Thinklogical.

要查看或添加评论,请登录

Brian Contos的更多文章

  • Happy Ada Lovelace Day!

    Happy Ada Lovelace Day!

    Happy Ada Lovelace Day! Every year since 2015, my daughters Zoey Contos (19) and Athena Contos (17) have been…

  • Happy Ada Lovelace Day 2022

    Happy Ada Lovelace Day 2022

    Happy Ada Lovelace Day 2022 everyone. My daughters Zoey (17) and Athena (15) and I have been celebrating this day for…

    1 条评论
  • My 2021 Podcast Guests

    My 2021 Podcast Guests

    With 2022 right around the corner I wanted to take a moment to look back at my Mandiant Cyber Security Effectiveness…

    4 条评论
  • Happy Ada Lovelace Day 2021

    Happy Ada Lovelace Day 2021

    At Mandiant we’ve always been focused on the strength derived from our diversity. Today, October 12th, 2021, we…

    1 条评论
  • Mandiant Advantage Q3 Video Podcast Interviews

    Mandiant Advantage Q3 Video Podcast Interviews

    In Q3 2021 we conducted some awesome interviews with experts at Mandiant to discuss Mandiant Advantage. You can check…

  • Board Perspectives on Cybersecurity - Video Podcast Series

    Board Perspectives on Cybersecurity - Video Podcast Series

    We wrapped up Q2 2021 with a fascinating series within the Mandiant Cyber Security Effectiveness Podcast. The focus of…

    1 条评论
  • Cybersecurity Video Podcasts - Federal & State Government Perspectives

    Cybersecurity Video Podcasts - Federal & State Government Perspectives

    I recently had the privilege of interviewing individuals with government backgrounds on the Mandiant Cyber Security…

    1 条评论
  • 20 Video Interviews in 2020 with Cyber Security Thought Leaders

    20 Video Interviews in 2020 with Cyber Security Thought Leaders

    In 2020 I had the privilege of conducting video podcast interviews with 20 of some our cyber security industry’s most…

    7 条评论
  • Ada Lovelace Day & 45 Interviews with Women Changemakers in Cybersecurity

    Ada Lovelace Day & 45 Interviews with Women Changemakers in Cybersecurity

    Across Verodin, Mandiant, & FireEye we’ve always been focused on the strength derived from our diversity. Today…

    16 条评论
  • 36 MONTHS AT VERODIN

    36 MONTHS AT VERODIN

    It’s October 24th, 2019, which officially marks my 36-month anniversary at Verodin, now part of FireEye. Over the past…

社区洞察

其他会员也浏览了