Insider Threats
Source: Ponemon Cost of Insider Threats Global Report 2022
Tutorial Content
At a Glance
- Access Controls
- Intentional/Unintentional Threats
- 2 Case Studies
As one of the more complex threat vectors discussed, in this tutorial we looks at some of the more common indicators associated with this notoriously challenging area of information security. Covering motivations, tactics, notable cases, and methods of identification, defending against insider threats requires both awareness and vigilances.
“Regardless of whether these threats are malicious or unintentional, it is important for you as a member of your organisation to be on the lookout … and to report possible insider threats if you identify them.”
- Hut Six, Insider Threats
Learning Objectives
- Understanding Common Motives
- Identification Methods
- Threat Reporting
- Completion time: ~ 10 minutes