This is a companion blog to the “The SafeHouse” podcast dated September 5, 2024 with host Jeff Edwards, Co-Chair of the SafeHouse Initiative and his guest Kyle Schlosser, Insider Threat Management, Data Loss Prevention and eDiscovery Subject Matter Expert.
“If you are interested in starting an insider threat program. The first thing that you should is the next time you log into your work computer think about the damage that you could do whether it’s intentional or unintentionally with the access your company entrusted you with.” – Kyle Schlosser
In today’s digital landscape, organizations face numerous external cyber threats, but the internal threats posed by employees and contractors can be just as significant. Insider threats can manifest in both intentional and unintentional ways, making it crucial to establish effective management programs to mitigate risks.
Insider threats refer to security risks originating from within the organization. Employees, contractors, or anyone with access to sensitive information can pose a threat, whether through malicious intent or simple negligence. Understanding the nature of these threats is the first step in developing a robust insider threat management program.
Kyle Schlosser describes your objective as: “I think at any firm, especially in a very competitive market, there’s always going to be a risk for insider threats where trusting employees to use their access responsibly. But that’s not always how it works out. (…) So the main objective for an insider threat program is to watch how your employees and your contractors are using their access.”.
To start an insider threat program, consider the following steps:
Implementing specialized tools is vital for detecting insider threats. While traditional security operations focus on external threats, insider threat management tools can provide deeper insights into user behavior, helping to differentiate between malicious and benign actions. For instance:
But what do you do, if you don’t have technology available? As Kyle points out “If you don’t have the tools at your disposal to help you identify insider threats in real time, (…) you need to understand where your high risk departments are, if there are people with incentive to take data to a competing firm.”
Real-life incidents highlight the importance of having an insider threat management program in place:
A recent incident involved Security Scorecard, where a former employee took sensitive data to a competitor. This situation could have been mitigated with a proactive insider threat program, which would have allowed the company to monitor abnormal behaviors leading up to the incident.
At Security Scorecard, Kyle describes, “they found that this competitor was hosting mock interviews with some of the other security scorecard employees, trying to get them to reveal trade secrets and other (…) sensitive information on how security scorecard runs.”.
Identifying early warning signs can help prevent insider threats. Some common indicators include:
Insider threats are a complex challenge that requires a comprehensive approach involving technology, awareness, and collaboration across departments. By understanding the nature of these threats and implementing effective management strategies, organizations can better protect their sensitive data and mitigate risks.
Kyle’s final recommendation is to think about putting yourself in the shoes of of your peers or your employees and thinking about what kind of damage they could do with the access that they’ve been entrusted with (…). And then (…) start thinking about some high risk areas, and (…) go start auditing, you know, activity in those areas regularly, maybe looking at any kind of logs that your systems or tools are producing, there’s a chance that there is a capability there for you to to review activity and identify abnormal behavior.”.
For organizations looking to enhance their security posture, establishing an insider threat management program is not just a recommendation; it’s a necessity in today’s rapidly evolving cyber landscape.