{"id":24842,"date":"2014-07-15T11:43:20","date_gmt":"2014-07-15T15:43:20","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24842"},"modified":"2014-07-15T11:43:20","modified_gmt":"2014-07-15T15:43:20","slug":"revamping-your-insider-threat-program","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/bradley-manning\/revamping-your-insider-threat-program.php","title":{"rendered":"Revamping your insider threat program"},"content":{"rendered":"<p><p>  Why it's important to do now, and factors to consider.<\/p>\n<p>    Think     headlines about data theft and leakage have nothing to do    with you? Think again. Many of these incidents have a common    theme: Privileged access. It's your job to make sure your    organization doesn't fall victim to the same fate by at the    very least examining your existing insider threat program, and    perhaps doing a major revamp.  <\/p>\n<p>        Edward Snowden's theft and release of National Security    Agency data, Army Private First Class Bradley Manning's        disclosure of sensitive military documents to information    distributor WikiLeaks and the shooting at the Washington Navy    Yard     by a credentialed IT subcontractor have given IT executives    across industries pause to reconsider their security policies    and procedures.  <\/p>\n<p>    Tips for insider-threat mitigation  <\/p>\n<p>    -- Sandra Gittlen  <\/p>\n<p>    \"A crescendo of discussions is happening in boardrooms    everywhere about the impact an insider could have on corporate    assets,\" says Tom Mahlik, deputy chief security officer and    director of Global Security Services at The MITRE Corporation,    a government contractor that operates federally funded research    and development centers.  <\/p>\n<p>    The Washington Navy Yard incident cost 12 people their lives;    the full impact of the WikiLeaks and Snowden data releases    cannot yet be quantified.  <\/p>\n<p>    \"These incidents have added another dimension to the threat    paradigm -- privileged access,\" Mahlik says.  <\/p>\n<p>    Mahlik suggests that existing insider threat programs must    increasingly be focused on users with elevated or privileged    access to critical information. To that point, he is leading an    overhaul of MITRE's own program. His goal is to understand the    threats insiders pose and to deter those threats via a program    that synchronizes people, policies, processes and technology.    \"We are in the nascent stage of this effort,\" he says.  <\/p>\n<p>    Realizing the new threat  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the rest here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.computerworld.com.au\/article\/549922\/revamping_your_insider_threat_program\/?utm_medium=rss&utm_source=sectionfeed\/RK=0\/RS=1wDE.B22djkaEy3xYeyhIs0Fykw-\" title=\"Revamping your insider threat program\">Revamping your insider threat program<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Why it's important to do now, and factors to consider. Think headlines about data theft and leakage have nothing to do with you? Think again. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[48],"tags":[],"class_list":["post-24842","post","type-post","status-publish","format-standard","hentry","category-bradley-manning"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24842"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24842"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24842\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}