preview

Insider Threats

Decent Essays

After reading this week's article, I personally felt there were a lot of concerning things. In the “Keeping Up with the Joneses: How Does Your Insider Threat Program Stack Up?” PowerPoint, there were a lot of disturbing true stories enclosed. The scariest part about all those stories is that the issue could have been prevented, detected, and mitigated before it progressed and spiraled out of control as it did. The one in the reading that made me especially frightened was the story about the computer programmer who resigned from the hospital. The malicious insider exploited the training program for hospital employees and created a logic bomb. This is unsettling because the logic bomb went undetected for two months and would have gone undetected …show more content…

Before my team assessed the efficacy of an insider threat program, we lacked several essential aspects crucial for mitigating, detecting, and preventing insider threats. Our former insider threat program lacked a lot of essential things and thus, made Goliath National Bank vulnerable to insider threats that could have potentially harmed its assets and intellectual property like trade secrets, strategic plans, and other confidential information. In order to protect the organization, Avatar should have placed more emphasis upon behavioral indicators instead of directing most of their effort and attention on technical indicators. If Goliath National Bank had noticed the red flags and realized that the insider threat was a disgruntled employee, he wouldn’t have been able to create and inflict so much damage through espionage. Thus, it is crucial for organizations to monitor their employee’s network on their personal or work device. In addition, our insider threat program lacked two of the five NIST framework core functions (i.e. identify, protect, detect, respond, and recover), which are important for risk management. Our insider threat program failed to address the respond and recover function. Since all the functions are interdependent upon one another and are necessary for proper, prompt, and efficient risk management, without any one of them, a lot of damage can result. The response function is essential because it has to do with the actions needed to be taken after a cyber security threat is detected. An organization has to know prior what specific action they want to take, whether it plans to gather data for law enforcement or take legal action to prevent the situation from escalating. The decision is crucial because it impacts the direction the organization takes. The recover function is crucial because it serves to decrease the impact and restore

Get Access