Unmasking insider threats

Deloitte
Total Views  :   934
Total Likes  :  
Total Shares  :  0
Total Comments :  0
Total Downloads :  0

Description

CFO Insights Unmasking insider threats As workplaces become more complex and insider threats become more difficult to detect, a program to mitigate those threats, which include fraud, espionage, workplace violence, information technology (IT) sabotage, intellectual property, and research-and-development theft, can bolster deterrence by providing an early-detection and response mechanism. Moreover, by viewing insider-threat mitigation more broadly than as a cybersecurity challenge, CFOs— working with their CIOs—can help assure the business, protect employees, and safeguard critical data, systems, and facilities. The goal of insider-threat mitigation is to detect anomalies as early as possible and investigate leads before assets, data, or personnel are compromised. Staying in front of an insider’s exploitative tactics, however, requires quick responses, real-time data feeds, and the analysis of behavioral indicators. And in this issue of CFO Insights, we’ll outline actions to consider when designing, building, and implementing a formal insider-threat mitigation program. • Define potential insider threats: An insider can be an employee, contractor, or vendor who commits a malicious, complacent, or ignorant act using their trusted and verified access.

Still, few organizations have a specific internal working definition, as security and IT budgets have historically prioritized external threats. Defining potential insider threats for the organization is a critical first step to formulating a program, and will inform the size, structure, scope, and phasing plan for the program, aligned to business risk priorities. • Define the organization’s risk appetite: Define the critical assets that must be protected—whether they are facilities, source code, or customer information— and the organization’s tolerance for loss or damage in those areas. Identify key threats and vulnerabilities in the business and in the way business is conducted. Tailor the development of the program to address these specific needs and threat types, and take into account the organization’s unique culture. • Leverage a broad set of stakeholders: An insiderthreat mitigation program should have one owner but a broad set of invested stakeholders, as well as leadership support. Consider establishing a crossdisciplinary insider-threat working group that can serve as change agents and ensure the proper level of buy-in across departments and stakeholders.

The working group should assist in addressing common concerns (for example, privacy and legal) and support the development of messaging to executives, managers, and the broader employee population. • Take a people-centric approach: The insider-threat challenge is not a purely technical one, but rather a people-centric problem that requires a broad and people-centric solution. Organizations should avoid the common pitfall of focusing on a technical solution as the silver bullet. An insider-threat mitigation program should include critical business processes, such as segregation of duties for critical functions, technical and nontechnical controls, organizational changemanagement components, and security training programs. 1 .

Who is an insider threat? Insider threats are seldom impulsive acts. Employees wishing to harm a current or former employer, business partner, or client—whether by stealing trade or government secrets, sabotaging information systems, or even opening fire on colleagues—usually plan their actions. And regardless of their motivation, their plans often percolate for some time, and they typically share the following traits: Insiders move along a continuum from idea to action. They don’t wake up one morning and decide to exploit confidential information. They get an idea, ruminate, and then begin testing the waters to see if they can execute the idea—maybe by trying to access sensitive data or a secure facility. Insiders leave evidence.

Red flags frequently take the form of changes in attitude or behavior: the insider may grow frustrated or disgruntled, begin violating corporate policies, come in or stay late at the office, show “undue interest” in information that may not be relevant to his or her work, or attempt to access physical areas where he or she doesn’t typically—or shouldn’t—work. Motivations vary. Some insiders who are a threat wish to get revenge against an organization they believe wronged them. Others seek some kind of personal or financial gain or to point out a perceived injustice.

Still others may operate as spies for a foreign government. There is no standard profile. An individual’s personality isn’t nearly as important as his or her actions. That said, you’re not looking for a specific behavior, but a pattern of behaviors that may indicate a potential insider threat. 2 To detect insiders’ actions before they do harm, organizations should establish a series of threat indicators, such as policy violations, job performance difficulties, or disregard for rules, based on high-value assets they wish to protect.

For example, manufacturers seeking to safeguard new product designs might keep an eye on insiders trying to access or download those plans, traveling to countries where intellectual property theft is prevalent, or experiencing financial difficulty. With insider-threat indicators established, companies can then begin to collect and correlate virtual and nonvirtual data about employees. Virtual data refers to the digital trails employees leave, say, when they log on and off the corporate network. Nonvirtual data includes information about an individual’s role in an organization, performance ratings, and work habits. While today’s insider-threat monitoring systems are effective in establishing a baseline for “normal” employee behavior and tracking deviations, organizations should not rely solely on technology to mitigate insider threats.

Instead, as outlined in the main article, they should consider instituting an insider-threat program that defines the assets a company wants to protect; establishes policies, procedures, controls, and training designed to protect those assets; and brings together stakeholders and data owners from a variety of functions, including HR, legal, compliance, finance, and administration. . • Trust but verify: Establish routine and random reviews of privileged functions, which are commonly done to identify insider threats across a broad spectrum of areas in a variety of industries. Organizations should trust their workforce, but balance that trust with verification to avoid the creation of unfettered access and single points of failure. Reviews are particularly essential in areas that are defined as critical. • Stay a step ahead: Insiders’ methods, tactics, and attempts to cover their tracks will constantly evolve, which means that the insider-threat program and the precursors that it analyzes should continually evolve as well. A feedback mechanism that includes an analysis of ongoing and historical cases and investigations can help organizations adapt their insider-threat programs to address new threats. • Look for precursors: Case studies analyzed by Carnegie Mellon University’s Computer Emergency Response Team program have shown that insider threats are seldom impulsive acts.

Instead, insiders move on a continuum from the idea of committing an insider act to the actual act itself. During this process, the individual often displays observable behaviors that can serve as risk indicators for early detection, such as requesting undue access or violating policies, for instance (see sidebar, “Who is an insider threat?”). According to the Federal Bureau of Investigation’s Insider Threat Program, detection of insider threats should use behavioral-based techniques, looking at how people operate on the system and off the network, and then build baselines in order to identify anomalies. • Set behavioral expectations: Define the behavioral expectations of the workforce through clear and consistently enforced policies that define acceptable behavior and communicate consequences for violating policies. Policy areas might include social media, reporting incidents, and bring-your-own-device, for example. • Connect the dots: By correlating precursors or potential risk indicators captured in virtual and nonvirtual arenas, organizations can gain insights into micro and macro trends regarding the high-risk behaviors exhibited across the organization.

Using an advanced analytics platform that correlates outputs from a variety of tools can be helpful, and the output can, in turn, be used to identify insider-threat leads for investigative purposes. Analytics can also shed new light on processes and policies that are either missing or could be improved upon. • Provide customized training: One size does not fit all. Customize training based on the physical and network access levels, privilege rights, and job responsibilities. Train the workforce to the specific insider-threat risks, challenges, and responsibilities for each position. Mitigating insider threats requires sponsorship from executive leadership and broad participation, from human resources to IT to operations and finance. In addition, to be effective, insider-threat programs should strike the proper balance between countering the threat and accomplishing the organization’s mission.

Too many security controls can impede the mission, while too few increases vulnerabilities and leaves the organization exposed. 3 3 . il, Global Research Director, CFO Program, Deloitte LLP; P Primary Contacts Adnan Amjad Partner Deloitte & Touche LLP aamjad@deloitte.com About Deloitte’s CFO Program The CFO Program brings together a multidisciplinary team of Deloitte leaders and subject matter specialists to help CFOs stay ahead in the face of growing challenges and demands. The Program harnesses our organization’s broad capabilities to Michael Gelles deliver forward thinking and fresh insights for every Director stage of a CFO’s career – helping CFOs manage the eaders and subjectDeloitte Consulting LLPstay ahead in the face of growing challenges and demands. The Program harnesses our roles, tackle their company’s matter specialists to help CFOs complexities of their nsights for every stage of a CFO’s career – helping CFOs manage the complexities of their roles, tackle their company’s most compelling mgelles@deloitte.com most compelling challenges, and adapt to strategic shifts in the market. at: Deloitte CFO Insights are developed with the guidance of Dr. Ajit Kambil, Global Research Director, CFO Program, For more information by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services.

This about Deloitte’s CFO Program, visit Deloitte LLP; and Lori Calabro, may affect your business. Before nor should it be used as a basis for any decision or action that Senior Manager, CFO making any our website at: www.deloitte.com/us/thecfoprogram. decision or taking any action that may r. Deloitte shall not be responsible for any loss sustained by any person who relies on this publication. Education & Events, Deloitte LLP. Follow us @deloittecfo This publication contains general information only and is based on the experiences and research of Deloitte practitioners.

Deloitte is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor.

Deloitte shall not be responsible for any loss sustained by any person who relies on this publication. About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. Please see www.deloitte.com/about for a detailed description of DTTL and its member firms.

Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. Copyright© 2015 Deloitte Development LLC. All rights reserved. Member of Deloitte Touche Tohmatsu Limited. 4 .

< 300 characters or less

Sign up to contact