Intelligent CISO Issue 61 | Page 50

Security teams must focus on identifying insiders who intentionally seek to divulge corporate information or disrupt business operations .
FEATURE
Once you ’ ve built up your internal defences , the next step is to start tracking who is likely to breach .
To track malicious insiders , businesses need a different line of attack . Malicious insiders probably have the roleappropriate access they need to disrupt business operations or leak corporate information . If you can ’ t stop them getting access , identifying them is the first step .
Security teams must focus on identifying insiders who intentionally seek to divulge corporate information or disrupt business operations . The task is made more difficult because insiders may have role-appropriate privileges .
Advanced identification approaches are necessary . Tracking indicators and techniques can be used to identify malicious insiders and activity .
That includes analysis of the motivations of someone who is potentially disgruntled at work . Those who may be looking for revenge , an ego boost or some financial gain are the first targets . The quiet quitters and are next on the list . The ASCS says happy staff are less likely to stab you in the back .
There ’ s no way to stop humans from making mistakes . Even the most highly trained professional will forget to bring their glasses to work and even your most dedicated employee will click on a link their ‘ boss ’ has sent .
With human error an inevitability , adequate and proactive protections become critical .
Awareness of threats and weaknesses is one of the best ways to counter them .
Organisations need to be constantly updating and assessing their training , checking all their office applications regularly and thinking outside the box – and outside the organisation – when it comes to understanding the threatscape .

Security teams must focus on identifying insiders who intentionally seek to divulge corporate information or disrupt business operations .

Most importantly , any technology adopted by the business must be adopted with security front-of-mind .
We ’ ll never stop criminals trying to steal sensitive data , but we can make it as hard as possible for them to do so – making a task not worth the trouble is ultimately the best deterrent . u
50 www . intelligentciso . com