Cybercrime & Cyberterrorism (CC)

CC2-3 I Am My Own Worst Enemy. A First Person Look at the Insider Threat

May 14, 2014

2:45 PM - 3:45 PM

Ahmed Masud


Trustifier, Inc.

In this session, we will discuss how the human factor combined with the demands, deadlines and stresses of business and life, means that users can't always trusted to follow security rules or policies. We hear all the time how the user is the weakest link in the security chain. Should users even be in the security chain? There is debate over how big the issue of the insider threat even is. In any case, thanks to events of last year, management now has a new worry; could the next Snowden like-incident occur in their enterprise?

Some key lessons from this discussion:

  1. Examining the insider threat. What does the insider threat include and why do we have it? Are we just talking about Snowden and Manning size incidents with massive data loss? Does the perpetrator always have evil intentions? What considerations are necessary to understand the potential insider threat? Are there implications for fraud, collusion and cybercrime?
  2. Why do most security people think that preventing insider breaches is simply impossible? Are current best practices for insider threat fully able to contain this threat? What are some of the possible limitations?
  3. We are learning the hard way that as an industry, information security is still quite immature over all. Insider threat protection may lag 10 years behind the rest of the industry. What direction does infosec technology need to go to be more effective in dealing with the insider threat? Is it possible to have better controls without impeding user and business productivity? (Hint: rules and enforcement need to align better with business activity)

Asis International


FCW Magazine

GCN Magazine

Intelligence Community news
International Police Mountain Bike Association


Police One

Free e-News Subscription

I agree to this site's Privacy Policy

Connect With Us

Facebook Linkedin Twitter Flickr