Insider Threats

Published: Feb. 14, 2019, 5:21 a.m.

b'

Defense in Depth\\xa0is available at\\xa0CISOSeries.com.

Is your own staff the greatest threat to the security of your company? On this episode of\\xa0Defense in Depth we discuss protecting your business from itself.

Check out this post and discussion for the basis of our conversation on this week\'s episode which is\\xa0co-hosted by me,\\xa0David Spark\\xa0(@dspark), the creator of\\xa0CISO Series\\xa0and\\xa0Allan Alford\\xa0(@AllanAlfordinTX), CISO at\\xa0Mitel.\\xa0Our guest is Vijay Bolina (@_jamesbaud_), CISO, Blackhawk Network.

Thanks to this week\\u2019s podcast sponsor, Fluency Security:

Fluency Security

Fluency\\u2019s correlation and risk scoring technology combined with their approach of using pseudonyms in place of certain PII data greatly facilitates your organization\\u2019s path towards compliance. Over time, machine learning and artificial intelligence algorithms detect anomalies at an impressive level of scalability. Run Fluency as a standalone or integrate it into your existing SIEM. Learn more by visiting us at booth #4529 at the RSA\\xae Conference 2019.

On this episode of\\xa0Defense in Depth, you\\u2019ll learn:

  • Nearly 1 in 5 people would sell their health record for $500. (source)
  • Insider threat mistakes can take many forms. It could be someone carelessly leaving a USB key somewhere or it could be a developer simply not securing their code.
  • Security people make mistakes just like non-security people. Difference is when a security person makes a mistake, chances are the gravity of the damage will be much higher.
  • A breach doesn\\u2019t necessarily have to damage the company. A breach simply means data left your protected area of the business. And that is still bad even if there was no actual damage.
'