Time
1 hour 25 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:10
protecting intellectual property and critical assets should be important to everyone within an organization.
00:17
When building your modern insider threat program, you don't have to do it alone. But no matter how good your team of stakeholders, maybe success isn't guaranteed without getting definitive buy in from leadership.
00:31
Hopefully, the executive already sees the value in an insider threat program.
00:36
After all, executive leaders air often the public face of the company and its their names in the headlines. When a data breach a curse,
00:45
the data clearly shows the risk from insider threat events is growing and is higher than ever.
00:50
However, if an executive trusts their people, the whole idea oven inside threat May *** found ball.
00:59
On top of that, an executive may be unsure about the utilization of resource is for the program.
01:04
So to get executive buy in, you'll have to be armed with good information.
01:10
And for that you'll need an executive risk assessment.
01:15
To be clear. This isn't a risk assessment of the executive. It's a risk assessment for the executive written so that they can understand it.
01:25
Which is not to say they're not smart. They are. It's just that they
01:30
you know what? I'm going to stop talking now, But let's hear from Peter Hodja Giorgio on what this risk assessment should look like.
01:38
While a detailed risk assessment is probably better left at the budgetary level, the executive summary information should be compelling.
01:46
The goal here isn't to pitch the executive of but argument.
01:49
Seasoned executives aren't driven by fear.
01:53
They're driven by business objectives, objective data, the bottom line and a good dose of practicality and reason.
02:00
Clearly defined and well articulated Insider Threat program should also be founded in those principles.
02:06
Typically, when executives conceive business value and a thorough cost benefit analysis, they're more apt to get on board with an insider threat program.
02:15
Here are some questions you'll want to be able to answer before soliciting executive support.
02:20
What insider threat risks are we vulnerable to today?
02:23
What is the business impact of any of those risks coming to pass?
02:29
Why can't our current security programs or tools fulfill this need?
02:34
What existing programs and tools are re leveraging to save as much money and time as possible?
02:39
How are we going to measure return on investment for any new programs, tools or headcount required for this proposal.
02:47
What is the time to value of your proposed plan?
02:51
And finally, what specifically do you need from me?
02:54
Your executive may not ask you all these questions, but you should be prepared to answer all of them.
03:00
Most executives want to know that there's some data behind the plan.
03:06
Others may be one over with a story of a company similar to yours having an insider incident and what they went through.
03:14
The executive may also have concerns about spying on their employees.
03:19
If you're insider threat program focuses on the activities and not the people, you should be able to eliminate those concerns.
03:27
The statistics show that the overwhelming majority of your insiders are trustworthy people.
03:31
Your insider threat program should start by assuming positive intent on the part of the user.
03:38
Investigations are based on the activity,
03:39
not the person
03:42
getting executive buy in leads to quicker stand up times and lower costs for the program by streamlining operations and getting cross functional collaboration.
03:53
The leadership stakeholders you have on your team can assist with this by promoting the project in their reports.
04:00
With teams working together, it helps with the executive buying of the project across the organization.
04:06
After all, nobody in the organization, especially the executive, wants to have to face the media for customers to explain the data breach regardless of intent.

Up Next

8 Steps to Building a Modern Insider Threat Program

In this course brought to you by Industry Leader Code42, we will cover the 8 crucial steps necessary to build a modern insider threat program for your organization.

Instructed By

Instructor Profile Image
Alex Matheson
Instructor