AMT "Insider Threat" Cyber Security

The Insider Threat by AMT-USC

An organization’s critical information assets (intellectual property, trade secret information, business strategies, etc.) are vulnerable to sabotage, loss, and theft by employees, trusted business partners, and contractors.

While the majority of attention is focused on the malicious and external threat posed by hackers, employees continue to be the biggest threat to organizations’ proprietary and regulated data (PHI, PII, PCI).
Verizon’s annual Data Breach Investigations Report claim 90% of all security events are caused by insiders.
Moreover, of those incidents caused by employees, trusted business partners, or contractors, 71% are unintentional.

Managing the Insider Risk

Managing the risks of IT sabotage, insider fraud, and theft of IP and trade secret information from trusted insiders through insider threat program development, internal investigations, and training and education.

Current or former employees, contractors, or business partners who has or had authorized access to an organization’s network, system, or data and has intentionally or unintentionally used that access to negatively affect the confidentiality, integrity, and availability of the organization’s information or information systems.

Insider Threat Program

A formalized program that uses both technical and non-technical (organizational) controls to detect and prevent malicious and unintentional insider activity through the centralized integration and analysis of control output to identify potential concerns related to an organization’s information or information systems.