Cybersecurity Blog: The Cyber Scene is evolving, are you?

Return to blog

Decisions that Make Companies Vulnerable to Insider Attacks

With the steady rise in cyber-attacks, network defense has become a security team’s number one priority. Many organizations have responded by investing heavily in the best tools to protect their information and systems from outsiders. The hard truth is these technologies are not designed to identify, let alone prevent an insider—contractor, employee, or trusted business partner—from taking information or corrupting a system they are authorized to access.

Unfortunately, the belief that network monitoring software will protect a company from all threats is a common objection to implementing an insider threat detection program. To learn more, download our whitepaper, 6 Reasons Insider Threat Detection Programs Are Missing from Corporate Security.

In an era where all of a company’s sensitive information is stored electronically and employees have greater access to that information than ever before, the decision to rely only on network monitoring tools for insider threat detection may be one many companies find themselves lacking.

Early Detection the Key to Defending Against Insiders

Recently, Harold Martin III, a technology contractor for the N.S.A., was arrested for stealing government documents and mishandling classified information. The breaches packed an even bigger hit to the agency when it was discovered Martin had access to top-secret data despite a record that included drinking problems, a DUI, unpaid debts, two divorces, a charge of computer harassment, and “a bizarre episode in which he posed as a police officer in a traffic dispute.”

To protect organizations, robust insider threat detection programs that combine existing network defense capabilities with insider threat detection tools like Arena ITI are needed. Such tools capture and assess human (non-IT) type behaviors, both internal and external, such as poor performance reports, lawsuits, criminal violations, and loan defaults, to detect at risk employees and proactively alert security teams of potential insiders. It also helps organizations become more efficient by prioritizing and driving security operations and investigations.

The real-world example of Martin illustrates the benefits of tracking human behaviors rather than just IT network monitoring. Cases where early indicators in human behavior are available to analysts are likely to be flagged sooner to minimize or eliminate damage.

Interested in an insider threat detection program for your enterprise? Leidos can help. Our insider threat experts have worked with numerous organizations to ensure their company assets, intellectual property, and employees are protected. Contact us today to learn more.

What's holding your organization back?

Download our whitepaper, 6 Reasons Insider Threat Detection Programs Are Missing from Corporate Security, to learn more about what holds back companies from protecting themselves against insiders. The paper also presents practical steps companies can take to move past their objections and defend themselves from insider threats.

Ollie Luba is a principal systems engineer at Leidos with 30 years of experience in analyzing, modeling and designing complex analytic systems for government and commercial clients. Currently, Ollie is the Product Manager and Technical lead for Leidos' insider threat identification solution. His educational background includes a BSEE from University of Pennsylvania, MSEE from Drexel University and a MS in Technology Management from the Wharton School/Penn Engineering. Ollie is based in Valley Forge, PA.