+ All Categories
Home > Technology > CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

Date post: 29-Nov-2014
Category:
Upload: activatenetworks
View: 602 times
Download: 0 times
Share this document with a friend
Description:
 
11
1 Insider Threats Tom McAndrew 1
Transcript
Page 1: CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

1

Insider Threats

Tom McAndrew

1

Page 2: CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

Ninja

2

ONNA- “Woman”

Ninja

Shinobi

KU – “NINE”

NO – “AND/TALENT

ICHI – “ONE”

HIMEJI Castle

Page 3: CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

American Ninja Warrior

3

Page 4: CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

Today’s Threats

4 http://www.nsa.gov/research/tnw/tnw194/article2.shtml

“The ongoing cyber-thefts from the networks of

public and private organizations, including Fortune

500 companies, represent the greatest transfer of

wealth in human history.”

Page 5: CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

ONCIX

5

Page 6: CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

ONCIX

6

• Insider threats remain the top counterintelligence challenge to our community.

• Over the past century, the most damaging U.S. counterintelligence failures were perpetrated by a trusted

insider with ulterior motives.

• In each case, the compromised individual exhibited the identifiable signs of a traitor – but the signs went

unreported for years due to the unwillingness or inability of colleagues to accept the possibility of treason.

• Insiders … are people who have been lured to betray their nation for ideological reasons, a lust for

money or sex, or through blackmail.

• Mankind's methods may change – but core motivations do not.

• Insiders convicted of espionage have, on average, been active for a number of years before being

caught.

• The damage caused by malicious insiders will likely continue to increase unless we have effective

insider threat detection programs that can proactively identify and mitigate the threats before

they fully mature.

http://www.ncix.gov/issues/ithreat/index.php

Page 7: CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

NITTF

7

Page 8: CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

Six Recommendations from FBI

8

“Remind employees that reporting security concerns is vital to protecting your company’s intellectual property, its reputation, its financial well-being, and its future. They are protecting their own jobs. Remind them that if they see something, to say something.” – FBI Insider Threats

Ease of Implementation

Less Technical More Technical

2. Educate and regularly train employees on security or other

protocols

4. Ensure that proprietary information is adequately, if not

robustly, protected.

1. Use appropriate screening processes to select new

employees.

3. Provide non-threatening, convenient ways for employees

to report suspicions.

5. Routinely monitor computer networks for suspicious activity.

6. Ensure security (to include computer network security) personnel have the

tools they need.

FBI: http://www.fbi.gov/about-us/investigate/counterintelligence/the-insider-threat ONCIX: http://www.ncix.gov/issues/ithreat

Page 9: CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

Why we need Network Analytics?

9

Page 10: CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

Rapid Adoption of 4 “Game Changing” Technologies

10

Page 11: CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

Final Note

11

Thanks for listening.

Tom McAndrew

[email protected]


Recommended