5 Key Elements to Building an Effective Insider Threat Strategy

1 minute read
Addressing Insider Threats

Cyber attacks carried out by nation-states and cybercrime rings often get the headlines, but insider threats can be far more costly and damaging. A recent cyber security study points to insiders as the most costly source of attacks at an average of nearly $145,000 each, and incidents involving insiders also take the longest to resolve, averaging 54 days.*

The risks insiders pose to organizations in all industries are very real, but many are failing to deal with the issue. A recent survey on insider threats revealed that while 74 percent of respondents are concerned about them, nearly half have no idea what they’re spending to address them, and 32 percent admitted they have no ability whatsoever to prevent an insider attack.**

Learn the 10 essential steps to securing your cloud data. Get your guide to creating and executing a successful cloud strategy.

In addition to best practices such as robust personnel background checks, security awareness programs and policy strategies for social media and BYOD, there are key tactics and strategies your organization can use to address insider threats.

View the on-demand recording to explore

  • The types of insiders behind these threats.
  • How to determine if your organization is doing enough to address them.
  • Five key elements to building an effective insider threat strategy.
  • How to move beyond IT and treat these threats as an operational issue that crosses people, process and technology.

Check out the slides from the Meet the Experts web event,
or listen to the on-demand recording below.

 

*   2015 Cost of Cybercrime Study by Ponemon
** SANS 2015 Survey on Insider Threats

Transform your business with cloud
Leave a Comment

You Might Also Like

About the Authors

Popular Today

Slideshows

Videos

@ForsytheTech