Time
12 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:07
The first thing we need to consider in a modern, data focused insider threat program is right there in the name.
00:13
The Insider
00:15
insiders can be employees, contractors or third party vendors who have authorized access to internal data or computing systems.
00:25
A good security plan will already restrict access to data on a as needed basis.
00:30
For instance, those in engineering probably shouldn't have access to human resource data.
00:36
But it's not so much who the insiders are but what they're doing.
00:41
Not all insider threats or malicious. Most of it is accidental.
00:46
Technology has made it easy for employees to share files via personal email and the cloud legitimately.
00:52
One wrong click, though, and an organization could be on the hook for millions of dollars in lost revenue, fines for non compliance, AH, loss of intellectual property and damage to the brand.
01:04
Malicious insiders have all the classic motivations, ranging from financial gain to wanting to Harmon organization in a specific way.
01:15
Hackers are sometimes for gotten as an insider threat, but once they gain access to a system inside,
01:21
they qualify as an insider threat.
01:25
But more recently, workforce turnover has accounted for more than half of all insider threat incidents.
01:32
According to the U. S. Bureau of Labor Statistics. Job turnover in the U. S is at an all time high
01:38
and that turnover creates risk.
01:42
The simple act of changing jobs. Contempt employees to take company data.
01:48
Roughly 2/3 of employees admit to taking data when they leave.
01:53
Some are merely trying to make their next job easier. Others believe the files belong to them because, after all, it's their work.
02:00
More nefarious employees might use sensitive data as leverage when negotiating a new job offer.
02:08
And insider threat isn't limited to data Leaving your organization.
02:14
What about the data coming into your organization?
02:17
If a new employees successfully exfiltrate a data from their previous job? Ah competitors, for example, and brought that data into yours?
02:27
Yeah, pretty sure your legal team is very interested in avoiding the impending lawsuit,
02:32
whether their employees, contractors or 1/3 party vendors. It's not the people that are a threat. It's their actions, malicious or accidental.
02:44
Most insider threats are accidental for those that are not. In addition to the classic motivations, employees are changing jobs at a record pace and more often than not when they leave. They take data with, um,
02:59
of course, The insider isn't the only thing we need to consider.
03:02
Check out our other videos to learn more about the wise and what's before. We tackle the House of building a modern insider threat program.

Up Next

Building a Modern Insider Threat Program

In this course brought to you by industry leader Code42, you will learn their respective frameworks on how to construct an effective enterprise insider threat program to protect your company from the inside out.

Instructed By

Instructor Profile Image
Alex Matheson
Instructor