SlideShare uma empresa Scribd logo
1 de 44
Understanding the Insider Threat in IT
Agenda ,[object Object],[object Object],[object Object],[object Object],This is no way meant to be an exhaustive list of a way of ensuring you are compliant with any regulations.  It’s not even an exhaustive list of all the regulations, let alone how to be compliant.  This is intended to be a primer on the concept, and we cannot even guarantee that it is an exhaustive primer.  If any of these were true, we’d all be exhausted. Certified under SDForum Regulation 2.678-SCC.2007
illustro Systems International, LLC… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],illustro Corporate Headquarters at the  Infomart—Dallas, Texas
illustro Systems International, LLC…  Moore-Handley, Inc.
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],illustro’s  Network Security
Mainframe    Backup Protection
Information, Information ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Accepted was Suddenly    Very, Very Bad ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fear – The Media Helps
Occupational Fraud – ACFE Study ,[object Object],[object Object],[object Object]
The Insider Threat Excluding mining, which only had one case (costing $17 million), the highest losses occurred in the wholesale trade industry, which had a median loss of $1 million among 30 cases.  Next highest were construction, with a median loss of $500,000 among 35 cases, and manufacturing, with a median loss of $413,000 among 101 cases.  Among the industries that showed the lowest median losses were retail (median loss of $80,000 among 75 cases) and government and public administration (median loss of $82,000 among 110 cases).
[object Object]
 
10 The sum of percentages in this chart exceeds 100% because in some cases respondents identified more than one detection method. The same is true for all charts in this Report showing how occupational frauds were detected.
 
The Perpetrators The perpetrators of occupational fraud are the people who use their positions within an organization for personal enrichment through the deliberate misuse or misapplication of the organization’s resources or  assets.
The Perpetrators… Source: ACFE Report to the Nation 2006
The Perpetrators… Source: ACFE Report to the Nation 2006
The Perpetrators… Source: ACFE Report to the Nation 2006
Why Don’t We Hear More? ,[object Object],[object Object],[object Object],[object Object]
Keeping it Quiet Source: ACFE Report to the Nation 2006
Real Cases: Employee Fraud  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Insider Threat in Banking & Finance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Audit Trail Challenge  ,[object Object],[object Object],[object Object],[object Object]
Every Element is Secured… … Except for User Access                                
Existing Fraud Detection Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Solutions?  ,[object Object],[object Object],[object Object]
Different Approaches to Insider Threat Application Server Application Screens End-User DataBase Logs Local Devices The only solution that non-invasively captures & analyzes actual user behavior as displayed on application screens Network Content Filtering Tools Log Aggregation Tools Bypassing Content Filtering Sensitive information displayed  on-screen can be easily leaked by writing it down or photographing the screen with mobile phone, bypassing Content Filtering  Fraud Detection Tools ,[object Object],[object Object],[object Object],[object Object],End-Point Content Filtering Tools ,[object Object],[object Object],[object Object],[object Object]
System Access Audit Appliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Access Audit Appliance
User Activity Replay Demo   System Access Audit Appliance
 
Real Case Demo  Leaking Information of Celebrities (VIP) There has been an indication that sensitive information pertaining to account number  5180774  has been leaked from inside the organization to an external source sometime between April  16 th  and  23 rd  of  2006 .
Intellinx Ltd. All Rights Reserved ©
Real Case Demo  IT personnel: risk of sabotage? There has been indication that mainframe program TRAN023 has been performing strange database activity which cannot be explained.
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Access Audit Appliance
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Access Audit Appliance
Detecting Internal Fraud in Banks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Detecting Internal Fraud in Insurance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Detecting Information Leakage ,[object Object],[object Object],[object Object],[object Object],[object Object],Users that are querying many VIP customer accounts Users that are querying same VIP customer account multiple times Searching for a VIP information by name  (not by account number) Privacy of VIP Accounts (celebrities)
A “Healthy Paranoia” ,[object Object],[object Object],[object Object],[object Object],[object Object]
A “Healthy Paranoia”

Mais conteúdo relacionado

Mais procurados

Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
Mike Saunders
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
Joseph White MPA CPM
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
banerjeea
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint Prezi
Kashif Semple
 

Mais procurados (20)

Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
CYBER51-FYLER
CYBER51-FYLERCYBER51-FYLER
CYBER51-FYLER
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat Detection
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint Prezi
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 
Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threat
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data Breach
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 

Destaque

Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
Arrow ECS UK
 

Destaque (11)

ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric ColeObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Intellinx overview.2010
Intellinx overview.2010Intellinx overview.2010
Intellinx overview.2010
 
How to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAMHow to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAM
 
Cevnvibertpresentation1
Cevnvibertpresentation1Cevnvibertpresentation1
Cevnvibertpresentation1
 
Insider attacks, lesson learned (cybercrime)
Insider attacks, lesson learned (cybercrime)Insider attacks, lesson learned (cybercrime)
Insider attacks, lesson learned (cybercrime)
 
OSI models
OSI modelsOSI models
OSI models
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Combating Internal Fraud - 5 Points You Should Think About
Combating Internal Fraud - 5 Points You Should Think AboutCombating Internal Fraud - 5 Points You Should Think About
Combating Internal Fraud - 5 Points You Should Think About
 

Semelhante a The Insider Threat

IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
Bill Lisse
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
sraina2
 

Semelhante a The Insider Threat (20)

Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Powerpoint v7
Powerpoint v7Powerpoint v7
Powerpoint v7
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
The challenges of Retail Security
The challenges of Retail SecurityThe challenges of Retail Security
The challenges of Retail Security
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
The Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent ThemThe Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent Them
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Top Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White PaperTop Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White Paper
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

The Insider Threat

  • 2.
  • 3.
  • 4. illustro Systems International, LLC… Moore-Handley, Inc.
  • 5.  
  • 6.
  • 7. Mainframe Backup Protection
  • 8.
  • 9.
  • 10. Fear – The Media Helps
  • 11.
  • 12. The Insider Threat Excluding mining, which only had one case (costing $17 million), the highest losses occurred in the wholesale trade industry, which had a median loss of $1 million among 30 cases. Next highest were construction, with a median loss of $500,000 among 35 cases, and manufacturing, with a median loss of $413,000 among 101 cases. Among the industries that showed the lowest median losses were retail (median loss of $80,000 among 75 cases) and government and public administration (median loss of $82,000 among 110 cases).
  • 13.
  • 14.  
  • 15. 10 The sum of percentages in this chart exceeds 100% because in some cases respondents identified more than one detection method. The same is true for all charts in this Report showing how occupational frauds were detected.
  • 16.  
  • 17. The Perpetrators The perpetrators of occupational fraud are the people who use their positions within an organization for personal enrichment through the deliberate misuse or misapplication of the organization’s resources or assets.
  • 18. The Perpetrators… Source: ACFE Report to the Nation 2006
  • 19. The Perpetrators… Source: ACFE Report to the Nation 2006
  • 20. The Perpetrators… Source: ACFE Report to the Nation 2006
  • 21.
  • 22. Keeping it Quiet Source: ACFE Report to the Nation 2006
  • 23.
  • 24.
  • 25.
  • 26. Every Element is Secured… … Except for User Access                
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. User Activity Replay Demo System Access Audit Appliance
  • 33.  
  • 34. Real Case Demo Leaking Information of Celebrities (VIP) There has been an indication that sensitive information pertaining to account number 5180774 has been leaked from inside the organization to an external source sometime between April 16 th and 23 rd of 2006 .
  • 35. Intellinx Ltd. All Rights Reserved ©
  • 36. Real Case Demo IT personnel: risk of sabotage? There has been indication that mainframe program TRAN023 has been performing strange database activity which cannot be explained.
  • 37.  
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.