Insider Threats
Source: Ponemon Cost of Insider Threats Global Report 2022
Tutorial Content
At a Glance
- Access Controls
- Intentional/Unintentional Threats
- 4 Case Studies
As one of the more complex threat vectors discussed, in this tutorial we looks at some of the more common indicators associated with this notoriously challenging area of information security. Covering motivations, tactics, notable cases, and methods of identification, defending against insider threats requires both awareness and vigilances.
“It is believed that around 64% of all insider threats are as a result of insecure behaviour, human error and general negligence, with only 23% of threats being classified as malicious.”
- Hut Six, Insider Threats
Learning Objectives
- Understanding Common Motives
- Identification Methods
- Threat Reporting
- Completion time: ~ 10 minutes