Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Tackling Insider Threats: Tips and Best Practices from Government and Industry Veterans

by Patience Wait
October 11, 2018
in Cybersecurity
Reading Time: 4 mins read
A A
Insider Threats
Share on FacebookShare on Twitter

When it comes to ensuring the security and integrity of IT assets cybersecurity professionals are concerned with all threats to the agency, but it might surprise you to learn that they are most concerned about insider threats. 

There are ways of thinking about protecting against insider threats and best practices in cybersecurity that can help contain the danger, said two cyber professionals at the 930gov Conference.

“Visibility is critical,” said Paul Parker, chief technologist, federal and national government, SolarWinds. He warned that the challenge is getting the right tools to work together. “We don’t have an absence of technology, what we have is the absence of integration,” Parker said.

The challenge is not a lack of information about insider actions, it’s identifying relevant information, using analytics to identify anomalies and, beyond that, being able to identify how much of a threat they represent.

Tim Jones, Director, System Engineering, Public Sector, ForeScout, agreed. “You have to know the assets, the types of devices, and who’s logging in on them,” he said. “How are [insiders] moving around in my environment?”

This means constantly surveying systems for new devices and thinking about new kinds of devices that historically haven’t been viewed as part of the infrastructure, such as video cameras, video conferencing centers, and IoT-enabled devices.

Among the key steps is making sure systems are configured properly – which includes making sure they conform to agency policies. “If my reality doesn’t match what I say I’m doing, I’m out [of compliance]”, Jones pointed out. “The reality is that you have to [keep] retouching systems” to make sure that nothing has changed.”

Having a strong patch management strategy does not simply mean scheduling the rollout of patches, Parker and Jones suggested. It’s what happens before deployment, especially downloading the patch and testing it to make sure it won’t blow up the system environment.

Key policy questions must also be addressed, such as what an agency’s policy will be for virtual private networks, or whether to allow personal devices or only agency-issued devices. “What do you want to allow, and what are your networks set up to support?” Parker asked. For instance, “NSA will never allow personal devices … What are they (your users) doing, and what do they need to be doing?”

Another step is to stop managing to the lowest possible standard. “Stop securing to the checkbox,” Parker continued. “If you’re only logging from specific systems, if you’re only logging certain types of events … you’re not getting a holistic look at the environment and your analytics will be screwed up from the start.”

At the same time, Parker and Jones suggested cybersecurity professionals worry too much about the latest standards, such as those promulgated by the National Institute of Standards and Technology (NIST), when they haven’t even finished mastering previous standards. “Why are you worried about the latest one when you haven’t implemented the last one?” Parker said. “Ask us [vendors] to give you what we’ve already got on [the Risk Management Framework], for instance, instead of reinventing the wheel.”

Finally, the two advised cybersecurity professionals not to just take a vendor’s word about what their products do, how they integrate, and their security posture. Instead, look closely at the vendor’s supply chain management strategy; see how well they are managing their own risks.

“One of you in this room is an insider,” Jones said. “I may not know you’re the insider today, but I need the tools to identify you.”

Ready to learn more about thwarting insider threats? You can do that here.

Tags: Agency Security PolicyData SecurityInsider ThreatsIntegrating security toolsPatch ManagementPaul ParkerPreventing Insider ThreatssolarwindsTim Jones

RELATED POSTS

active alerting
Civilian

Moving from Passive to Active Alerting Equips Agencies and Organizations with Tools to Monitor and Fix Network Issues

June 17, 2022
Defending Agency IT
Civilian

Defending Agency IT Environments With a Public/Private Partnership

May 6, 2022
Bolstering Data Security
AI & Data

Bolstering Data Security with Modern Data Management: Part Three of Thinking with a Data-First Mentality in a Digital-First Government

April 28, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5385 shares
    Share 2154 Tweet 1346
  • The Future for the Air Force Depends on Agility and Resilience at the Edge

    86 shares
    Share 34 Tweet 22
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    42 shares
    Share 17 Tweet 11
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us