Time
12 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:05
insider threat programs aren't going to be cookie cutter.
00:09
The program your organization builds will most certainly look different than the one in mine.
00:15
Regardless of the specific needs and culture of your organization, there are several common considerations you should take into account when building out your insider threat program.
00:27
First are the insiders themselves
00:30
whether their employees, contractors or third party vendors. Insider actions represent two types of threat,
00:38
malicious
00:40
and accidental.
00:42
Outside of the classic motivations, employees are changing jobs at a record pace, and the fact is, when they leave, they often take data with them.
00:52
Absent or underdeveloped, insider threat programs would only make the situation worse, leaving corporate data vulnerable and wide open for the taking.
01:02
The next thing you're insider threat program needs to take into account our The technology is driving this age of collaboration.
01:10
The very tools that workers used to collaborate have become some of the most popular vectors for moving data from one organization to another.
01:19
Your insider third program will need to be flexible as new software processes and work flows come into your organization introducing MAWR ex filtration vectors that aren't easily blocked.
01:34
Finally, a critical consideration for your new insider threat program, you need to bring in stakeholders from legal and human re sources as well as I T and Security. And that includes physical security to round out an effective program
01:52
not only because of the regulations covering certain types of data or the desire to avoid legal action. You'll need to partner with both HR and Legal if an investigation turns up a malicious insider threat.
02:07
And here's some food for thought
02:08
Instead of profiling the people, let's focus on the activity
02:15
by assuming positive intent will make insiders are allies, not the enemy.
02:21
Of course, if our investigation reveals the intent wasn't positive, well, that's where HR and Legal can get involved.
02:29
Congratulations. With all these considerations in mind, you're ready to start building a modern insider threat program.

Building a Modern Insider Threat Program

In this course brought to you by industry leader Code42, you will learn their respective frameworks on how to construct an effective enterprise insider threat program to protect your company from the inside out.

Instructed By

Instructor Profile Image
Alex Matheson
Instructor