Managing the risks presented by insider threats is, in large part, founded on historical counterintelligence precepts. In this webcast, I discussed three counterintelligence practices for the digital age and how these proven maxims may be translated into controls to enhance your cybersecurity posture.
- Be offensive: While today’s threats are ever evolving, one constant is the human element as a primary threat vector. Rather than merely responding to events after-the-fact, get ahead of a potential incident by identifying human threat indicators -- and offer risk treatments before threats materialize to better secure company resources and intellectual property.
- Own the street: Historically, physical surveillance kept watch over nefarious activities on our streets, and today we must have the same vigilance of the digital highway. Look to enhance your organization’s situational awareness to defend your assets, personnel, and reputation better.
- Don’t ignore analysis: The best insider threat programs have not only sophisticated technology, an established governance structure, and awareness and reporting programs, but also the means to discern the importance of each of these components’ results. It is only through appropriate analysis that data becomes operationalized information. Enhance your risk management operations with on-site teams to meet your analytical requirements from initial operating capability through optimization.