Introduction - Insider Threats: Avoiding the Next Snowden (01:53)
Edward Snowden stole approximately 1.7 million files. This video features Kevin Jones and is intended to inform professionals on insider threats. This segment orients viewers to the topics that will be covered in this video including current trends, characteristics, monitoring, and detecting these criminals.
Insider Threats Today (05:15)
Most corporations handle insider crime cases in-house and do not involve law enforcement or take legal action. Jones describes how cloud computing has changed the way corporations store data. Insider threats include disgruntled employees, service providers you trust your data to, and not focusing on potential scenarios.
Characteristics of an Insider (03:51)
Half of IT Managers surveyed described how privileged user accounts were shared. BYOD creates increased risks. Characteristics include a disgruntled employee, financial reasons, and whistleblowers.
Monitoring and Detecting Insider Crime (05:20)
Protect systems and data by ensuring users follow privilege practices, access only what is essential; corporations should have checks and balances in place and establish a behavioral baseline. Monitor management systems and security vaults. Jones recommends enforcing written IT policies.
Cloud Computing Risks (05:05)
Jones recommends asking who has access to resources, what the vendor's policies are, and what guarantees can they make. Employ threat detection programs like risk assessments on employees. Best practices include knowing your employees, making sure accounts are shut off immediately after a dismissal, and examining bad behavior patterns.
Conclusion - Insider Threats: Avoiding the Next Snowden (06:27)
Jones discusses updates on the Heartbleed Bug and how to combat it. Examine disgruntled employees and those who have information they do not realize is sensitive. Emerging trends include behavior analytics.
For additional digital leasing and purchase options contact a media consultant at 800-257-5126
(press option 3) or firstname.lastname@example.org.