Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management
    • Storage

    Security Experts Weigh In: Best Practices to Identify and Mitigate the Insider Threat

    By
    eWEEK EDITORS
    -
    March 4, 2009
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Security Experts Weigh In: Best Practices to Identify and Mitigate the Insider Threat

      1

      2No Title

      2

      “Trust can always be broken, but we can limit the resulting damage. The separation of functions, limitation of privileges, and vigilant monitoring can reduce the consequences of malicious acts and honest mistakes. We need to make it easy for users to do the right thing, but very difficult to cause disasters.”Dr. Ulf Lindqvist, program director, Computer Science Laboratory, SRI International

      3No Title

      3

      “In today’s economy, the insider threat is a top concern. The perfect recipe for insider cybercrime combines financial stress with easy access to corporate data and a host of on-line black market outlets ready to turn information into cash. To effectively address cybercrime, companies must use an inside-out security approach that monitors events and suspicious behaviors across the entire computing infrastructure. Prioritizing mission-critical assets that store information is key to delivering the necessary level of security to prevent, detect, and respond to insider cybercrime.”Tom Reilly, president and CEO, ArcSight, Inc.

      4No Title

      4

      “Maintaining the privacy and protection of patient records must be a top priority for healthcare organizations. IT and security departments have to meet security challenges head on to ensure HIPAA compliancy by implementing better processes specific to controlling end user access across their computing environments. However, compliance does not always equal security. It’s important to be able to correlate events and attribute meaningful analysis to user behavior on the network. Responding to threats in real-time reduces the risk of data breaches whether they are deliberate or unintentional.” Brad Blake, IT Director, Boston Medical Center, ArcSight customer

      5No Title

      5

      “Develop a centralized log management and analysis process and replace manual log reviews with automated tools. SIM tools can be justified based on improved visibility and responsiveness to potential security breaches. Include logs from both the wired and the wireless environments.”Dr. David Taylor, CISSP and founder, PCI Knowledge Base

      6No Title

      6

      “Given that most breaches are inadvertent, develop acceptable use policies with feedback from managers to insure that policies don’t hamstring users trying to perform their jobs. Then work to get buy-in from end users with both a carrot and stick approach. An example of a carrot could include offering security workshops to educate users and an example of a stick could be that documented incidences of data breaches would have a negative impact on job performance reviews and potentially promotions.”Paula Musich, Senior Analyst, Enterprise Security, Current Analysis

      7No Title

      7

      “Building controls directly into the LAN is the best means for achieving a concrete defense against insider threat. Doing so with integrated devices that offer identity and application control allows organizations to achieve both capital and operational savings while protecting their digital assets. User and application control in the LAN ensures access policies are enforced, controls non-user devices, and tracks all activity of specific users—by name—for reporting, compliance, and accountability.”Joe Golden, CEO, ConSentry Networks

      8No Title

      8

      “You need to inspect traffic and activities beyond a user’s initial connection to the LAN. You want a solution that is extremely configurable and identity based (not device based)—this enables you to create access policies based on what resources users typically need and restrict them to those applications and servers. The bottom line for me: the goal of security is to protect the business, not disrupt the business. Finding a security solution that can protect the company’s intellectual property without intruding on day-to-day activities is key. If I can control more, I can regulate less.”Max Reissmueller, senior manager of infrastructure and operations, Pioneer Electronics (USA) Inc., ConSentry customer

      9No Title

      9

      “Employees are using risky Internet applications to be productive, according to research by the Ponemon Institute. In addition to changing employee behavior, companies need to know where the confidential information on Internet applications is stored and then protect this data. We recommend limited use of portable devices, enhanced perimeter controls—such as firewalls, network surveillance, access controls, and device scanning.”Dr. Larry Ponemon, chairman and founder, The Ponemon Institute, LLC.

      10No Title

      10

      “Organizations can never prevent insider abuse, but they can minimize its impact by implementing independent auditing practices. Start by deploying real-time technology to detect unauthorized intellectual property traffic, server configuration changes, and remote network access. Regularly audit the oversight tools to ensure that trusted insiders are abiding by the approved policies and procedures that safeguard the company.”Eric Ogren, Principal Analyst, Ogren Group

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×