PALM BEACH GARDENS, FL. --PRNewswire-- The 2019 Insider Threat Program Maturity Model Report has just been released, helping security professionals assess their organization's ability to monitor for, detect and respond to insider threats. The report was authored by Jim Henderson, CEO of Insider Threat Defense, and Nick Cavalancia, Founder & Chief Techvangelist at Techvangelism, and sponsored by Veriato, an innovator and global leader in insider threat security solutions.
The key takeaway from the report: only 7 percent of organizations rate themselves as having an optimized Insider Threat Protection Program, even though 60 percent of cyber attacks are carried out by insiders and the average cost of an Insider Threat is approaching $9 million.
"Most damaging security threats do not originate from malicious outsiders or malware, but from trusted insiders," said Patrick Knight, senior director of cyber strategy and technology at Veriato. "Recent studies indicate that insider threats account for 60 percent of cyber attacks, and they are incredibly difficult to detect without a mature Insider Threat Program in place. By using this Maturity Model report as a reference, organizations can see where their program needs improvement, and work towards an Optimized level of maturity."
The 2019 Insider Threat Program Maturity Model classifies Insider Threat Programs into the following five categories:
- Nonexistent: the organization has no program or technology in place to detect and respond top insider threats, and is unaware of the risk posed by an insider threat.
- Reactive: The organization has no program in place, but is aware that insider threats exist. IT is responsible for responding to any realized threat actions.
- Proactive: The organization's focus is on the use of technologies (and the necessary inter-departmental communication to facilitate use) that will help spot any insider threats within a core group of high-risk users.
- Predictive: the organization has a formal program in place that seeks to identify potential or active threats as early on as possible. Program definitions, policies, processes, and technologies are in place organization-wide.
- Optimized: the organization's program is holistic, dynamic and responsive, continually addressing shifting risk and changes in business operations that impact needed policy, process, and technologies.
The report details each of these maturity levels, giving security professionals an idea of the goals and objectives, awareness level, governance, risk assessment, policies, monitoring, processes, intelligence sources and communications and training involved within each category. This provides a benchmark for where they currently are and what is required to improve their existing Insider Threat Program.
Within the report, there is data and information that provides security professionals with insights into the necessary steps required to mature their existing program. Key action items for maturing an Insider Threat Program include; support of C-Suite and key departments, assembly of a team to help align interests of all its members, establishment of a formalized communications process and creation of a budget to support the