Insider threats are among the most difficult cybersecurity risks to detect and mitigate because they come from trusted individuals inside an organization. Whether it’s a disgruntled employee selling sensitive data, an unintentional mistake by a well-meaning user, or a third-party contractor with too much access—insiders pose a significant security risk. In this episode, will break down the different types of insider threats, why people turn against their organizations, and how to detect and mitigate insider threats before they cause damage. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at [email protected]
Case Studies:https://www.digitalguardian.com/blog/tesla-data-theft-case-illustrates-danger-insider-threathttps://www.theregister.com/2020/08/26/former_cisco_engineer_aws_webex_teams/
https://www.nbcnews.com/tech/tech-news/laptop-nasa-workers-personal-data-stolen-flna1c7079170
https://www.tunedsecurity.com/the-2013-target-data-breach-an-analysis-of-one-of-the-largest-retail-cyberattacks-in-history/
https://www.nbcnews.com/news/world/how-snowden-did-it-flna8C11003160
Follow Us:
YouTube
Facebook
LinkedIn