- Use Cases
PALM BEACH GARDENS, FL. --PRNewswire-- The 2019 Insider Threat Program Maturity Model Report has just been released, helping security professionals assess their organization's ability to monitor for, detect and respond to insider threats. The report was authored by Jim Henderson, CEO of Insider Threat Defense, and Nick Cavalancia, Founder & Chief Techvangelist at Techvangelism, and sponsored by Veriato, an innovator and global leader in insider threat security solutions.
The key takeaway from the report: only 7 percent of organizations rate themselves as having an optimized Insider Threat Protection Program, even though 60 percent of cyber attacks are carried out by insiders and the average cost of an Insider Threat is approaching $9 million.
"Most damaging security threats do not originate from malicious outsiders or malware, but from trusted insiders," said Patrick Knight, senior director of cyber strategy and technology at Veriato. "Recent studies indicate that insider threats account for 60 percent of cyber attacks, and they are incredibly difficult to detect without a mature Insider Threat Program in place. By using this Maturity Model report as a reference, organizations can see where their program needs improvement, and work towards an Optimized level of maturity."
The 2019 Insider Threat Program Maturity Model classifies Insider Threat Programs into the following five categories:
The report details each of these maturity levels, giving security professionals an idea of the goals and objectives, awareness level, governance, risk assessment, policies, monitoring, processes, intelligence sources and communications and training involved within each category. This provides a benchmark for where they currently are and what is required to improve their existing Insider Threat Program.
Within the report, there is data and information that provides security professionals with insights into the necessary steps required to mature their existing program. Key action items for maturing an Insider Threat Program include; support of C-Suite and key departments, assembly of a team to help align interests of all its members, establishment of a formalized communications process and creation of a budget to support the