Curriculum > Information Security & GDPR > Targeted Attacks > IS115

Insider Threats

Source: Ponemon Cost of Insider Threats Global Report 2022

Tutorial Content

At a Glance

  • Access Controls
  • Intentional/Unintentional Threats
  • 4 Case Studies

As one of the more complex threat vectors discussed, in this tutorial we looks at some of the more common indicators associated with this notoriously challenging area of information security. Covering motivations, tactics, notable cases, and methods of identification, defending against insider threats requires both awareness and vigilances.

“It is believed that around 64% of all insider threats are as a result of insecure behaviour, human error and general negligence, with only 23% of threats being classified as malicious.”

- Hut Six, Insider Threats

Learning Objectives

  • Understanding Common Motives
  • Identification Methods
  • Threat Reporting
  • Completion time: ~ 10 minutes