The digitization of the business ecosystem has generated new opportunities for growth and transformation of organizations across industries. This digital revolution has also introduced new risks to business operations as cybersecurity threats evolve and proliferate.
While organizations have long prioritized external cybersecurity risks, many are now considering the risks posed by trusted insiders due to the potentially greater damage they can cause. Consequently, organizations are beginning to recognize the importance of establishing controls to combat insider risks.
The most common insider risks include espionage, fraud, loss of sensitive business assets, sabotage and physical violence.
Several high-profile incidents attributed to insiders have contributed to increased awareness. Recent examples include theft of sensitive data from a leading technology company and sabotage of an automotive manufacturer’s operations. Regardless of industry, the impacts of insider incidents are potentially devastating—and financially steep. The average cost of insider incidents has climbed to $8.76 million, according to a study by the Ponemon Institute1.
Overall, cybersecurity has evolved from an information technology (IT)-centric function to an organization-wide risk management issue. While insider risk management is evolving in a similar way, current market adoption strategies emphasize use of additional tools and technologies to address insider risks without including the underlying principles of risk management.
* The Ponemon Institute, “2018 Cost of Insider Threats: Global Organizations,” April 2018.
** Crowd Research Partners, “Insider Threat 2018 Report,” 2018.
Insider Threats Impacting your Business
Insiders perpetrate five different types of malicious activities that will impact your business. On average, insider attacks cost more than the external breaches due to the insider's knowledge of the environment and location of critical assets or "crown jewels".
Deliberate destruction, damage, or obstruction, especially for political or military advantage. Example: An insider deletes backups and wipes the production database before leaving the company.
Wrongful or criminal deception intended to result in financial or personal gain. Example: An insider exfiltrates a key database and sensitive data elements are sold.
The practice of spying or of using spies, typically by governments to obtain political and military information. Example: A foreign adversary uses an insider to gain information access for the purpose of blackmail or economic advantage. The insider provides a five-year business strategy to a competitor company.
The act of stealing information stored on computers, servers, or other devices with the intent to compromise privacy or obtain confidential information. Example: An insider with access to intellectual property data steals critical patents, trade secrets, R&D data, etc.
Workplace violence is any act or threat of physical violence, harassment, intimidation, or other threatening disruptive behavior that occurs at the work site. It ranges from threats and verbal abuse to physical assaults and even homicide. It can affect and involve employees, clients, customers and visitors.
Our enterprise wide approach to managing insider threat
Establishes the constitution of the program and ensures consistency with organizational culture, sets guidelines for consistent application, and creates structure for acting on ambiguous information.
Sets tone and direction, helping the program be consistently understood, implemented, and used across the organization.
Enables risk-based prioritization and decision making to balance threat reality against critical business assets.
Enables executive vision and intent to permeate the organization and create a corporate culture attuned to risk and anomalous behavior.
Integrates sophisticated tools and enriched data to create a technical intelligence platform that fuses sources, links threats and risks, curates historical records and ongoing cases, and supports risk-based decision making.
Insider risk management programs often focus exclusively on implementing tools and technology without incorporating the necessary organizational, risk management, and cultural considerations. Without using those considerations to fine-tune the collection, the tools are not able to discern between relevant and non-relevant data, essentially searching for the needle in the proverbial haystack. Technology plays an important role, but is just one component of an effective program.
Culture should be considered when defining the program scope and goals. The program should protect the organization, people, and critical assets without being perceived as an overbearing authority or impeding the organization’s goals and operations.