Tier 3 Huntsman - Insider Threats
-
date post
19-Oct-2014 -
Category
Technology
-
view
158 -
download
1
description
Transcript of Tier 3 Huntsman - Insider Threats
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
INSIDER THREATS:
Behaviour is key to
early detection
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
Whistleblowers make the headlines
Careless Staff cause the most data loss
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
The 2014 Global State of Information Security
Survey® Key Findings, PWC, September 2013
Careless Employees
Two-thirds of the respondents felt that careless employees posed a greater security risk to their organizations than did
cybercriminals. ‘They're more concerned with someone losing a cell phone in a cab than they are of cybercriminals
hacking into a mobile device.’
‘Every 3.5 seconds, someone in America loses a cell phone.’
Mobile security incident costs, regional threat differences revealed CSO, June 5, 2013
Lost Phones Cost Americans $30 Billion a Year MarketWatch, March 23, 2012
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
The trouble with Insiders
They can compromise sensitive data without malicious
intent - through ignorance, negligence and just plain
carelessness.
What you can do
• Provide better education
• Build a stronger culture of security awareness
• Define policies, processes and controls that safeguard
your critical data and staff access to it.
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
How Great is the Insider Threat?
‘… almost two thirds of information security and IT professionals rated Insiders as their greatest security risk.’ Insider Threats And BYOD Greatest Risks In State
of Network Security 2013 Survey, dark READING, April 17, 2013
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
Most fraud is committed by non-technical contractors or affiliates. Theft of IP and IT sabotage are mostly the work of technical affiliates.
Trusted Affiliates & Business Partners
Source: Spotlight On: Insider Threat from Trusted Business Partners, CERT, SW Engineering Institute, Carnegie Mellon
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
The 2014 Global State of Information Security
Survey® Key Findings, PWC, September 2013
‘Data loss prevention (DLP) systems, encryption, internet
monitoring tools and other restrictive controls are failing to
deliver total security,’ the Carnegie Melon CERT report says,
‘with a growing number of data breaches linked to insiders.’
Study Probes Insider Threat in Financial Services Sector, Software Engineering Institute, Carnegie Melon, July 31, 2012
Why are IT Security Defences failing?
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
Will more technology succeed?
Predictive Analytics, Big Data …
‘The most effective way to prevent and detect
insider crimes is to make it an enterprise-wide
effort to master both the technical and
behavioural aspects of the problem.’
Study Probes Insider Threat in Financial Services Sector,
Software Engineering Institute, Carnegie Melon, July 31, 2012
When Technology Fails to Deliver
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
Insider Threat - The FBI’s 5 Best Practices
1. Focus on deterrence not detection, so that malicious behaviour will
stand out from the ‘noise’ of normal business
2. Know your people - Know who your weak links are
3. Identify information that is most likely to be valuable to others,
and add more protection
4. Monitor ingress and egress points for information
5. Baseline normal activity and look for anomalies.
FBI 5 Best Practices For Combatting The Insider Threat In Your Business, Forbes, August 7, 2013
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
SLIPPING AWAY FROM YOU?
More data and applications in the cloud
More smart mobile devices, more BYOD
More Mobile Workforce
More contractors and affiliates
More complex security challenges
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
Access rights based on user roles
Close supervision of users
Monitoring of supervisors (QC)
Separation of functions
Fine-tuning of processes & policies
A BRAVE NEW WORLD NEEDS BETTER CONTROLS
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
Resources Insider Threats: Behaviour is Key to Early Detection – Short White paper How to Combat Insider Risk with Huntsman – Application Brief IT Security 2014 Threats & Trends – fully-referenced Hot Shot
Follow us
Contact us