Government agencies know all too well the number and type of threats that come at their networks from the outside world on a daily basis.
But what about the threats from inside their organizations?
Since the Snowden Affair, there’s been a lot more attention paid to the insider threat – both malicious and inadvertent – by the media, agency heads, and Congress, but IT leads still aren’t equipped to address the threat head on.
Because of the focus on threats from external sources it’s a practical reality that investments have tended to be made into cyber-defense tools that face outward and not inward. In facing outward, these tools do not offer a view of the precise locations where malicious insider lurk — your endpoints, namely laptops, workstations, and mail servers.
Without going through a lengthy and expensive procurement process to buy yet more IT security kit, what can be done to solve this particular problem?
One solution is to invest in security analytics. Not only can analytics provide an early look at potential insider activity, but, more importantly can help establish a baseline of normal relationship and behaviors, to make the identification of anomalies far simpler.
In this on-demand webinar, presented by Guidance, leading internal investigators walk you through some recent insider attacks and discuss areas where analytics were fundamental to early detection and loss prevention. To listen to the webinar click here…