A lot goes into an effective cybersecurity strategy, but many rank-and-file, business-side employees are often surprised at their centrality to defending against cyber threats.
Posts Tagged: “insider threats”
Agencies should adopt a layered security approach that combines access, identity and security event management to detect and disrupt insider threats before damage is done.
The common trait insider threats have is their access to an agency’s internal data, IT infrastructures and security practices.
“Insider threat” is an ambiguous phrase, as it denotes any individual with access to an organization’s insider information.
In a recent interview with Paul Parker, Chief Technologist – Federal and National Government at SolarWinds, and Don Maclean, Chief Cybersecurity Technologist for DLT Solutions, we asked what it took to adopt a risk-management approach to cybersecurity
To understand how agencies can better tackle potential insider threats, we heard from Jay White, Director of the Security Services Division for the Mississippi Dept. of Information Technology Services, and David Geick, Director of IT Security Services DAS/BEST for the state of Connecticut. They suggested four tactics for increasing agency security from intentional or malicious… Read more »
External threats may be more sensational — the sophisticated hackers who troll our networks phishing for a way in are often the headline-grabbers — but for many federal network administrators, the biggest threat may be sitting right next to them.
Now that some of the greatest threats to the United States are from cyberattacks, rethinking your agency’s defense infrastructure is critical
Learn how to tackle insider threats.
Best practices for mitigating both intentional and accidental insider threats within government organizations.