Intelligent CISO Issue 48 | Page 41

EXPERT OPINION

Turning enterprise security inside out

The insider threat is one of the most harmful threats to an organisation and business leaders are becoming heavily reliant on operating with a Zero Trust approach to security .
Renaud Perrier , SVP International , Virtru , discusses the importance of a Zero Trust model for transforming the way you monitor ,
prevent and mitigate risks associated with insider threats .

M

Maximising collaboration and data protection with Zero Trust
According to Verizon ’ s recent Data Breach Investigation report , 85 % of data breaches involve a human element — whether that be a phishing attack , human error , intentional misuse of privileges , or data misuse . While this might seem a pretty alarming statistic , it represents an opportunity for security leaders to fundamentally shift how they approach securing their data and their organisation .
As many organisations still continue to focus outward — on the perimeter — to prevent malicious cyberattacks , they may overlook internal security behaviours that could put their organisation at even greater risk . But we all know that perimeters get breached and people make mistakes ; why not switch things up and manage security from the inside out ?
Mitigate the insider threat
Most of the time , insider threats aren ’ t malicious or even intentional . It can be as simple as selecting Sarah from your stationery supplier rather than Sarah from finance and in the blink of an eye your sensitive customer data is out in the ether .
More unusual — but still an area of concern — is the disgruntled employee who chooses to exfiltrate company data . This presents a risk to organisations where data access is not carefully governed , granting employees with more access to sensitive data than they realistically need to do their jobs .
Renaud Perrier , SVP International , Virtru
Unfettered access to sensitive customer data is a significant risk that needs to be mitigated to reduce the likelihood of a malicious insider threat .
Regardless of the intent , data is the common denominator across these insider threat scenarios — and protecting the data itself has to be a key priority . But businesses still need to collaborate and share information . In a world where speed and innovation are essential , locking down the data can ’ t be the answer .
Instead , imagine this : rather than stopping the flow of data as a means of securing it , you can provide your workforce with a way to easily share and innovate across applications and ecosystems , knowing you have full control over where it goes and who can access it . www . intelligentciso . com
41