Insider Threats (RIMS 2012)
-
Upload
john-dillard -
Category
Documents
-
view
268 -
download
2
description
Transcript of Insider Threats (RIMS 2012)
© Big Sky Associates, Inc.
Setting Up Campagainst insider threats
© Big Sky Associates, Inc.
The Problem
© Big Sky Associates, Inc.
$9 Billion650%
© Big Sky Associates, Inc.
75% inside
outside 25%
© Big Sky Associates, Inc.
34%
© Big Sky Associates, Inc.
© Big Sky Associates, Inc.
many points of failure.
© Big Sky Associates, Inc.
© Big Sky Associates, Inc.
What should we do about it?
© Big Sky Associates, Inc.
Deter
Detect &
Mitigate
Neutralize &
Exploit
© Big Sky Associates, Inc.
© Big Sky Associates, Inc.
© Big Sky Associates, Inc.
Security gets a little easier
© Big Sky Associates, Inc.
That’s interesting, but it doesn’t
sound like a game-changer.
© Big Sky Associates, Inc.
When it gets really cool
© Big Sky Associates, Inc.
Prediction
© Big Sky Associates, Inc.
Info
rmati
on
Risk
Manageable, but daunting
Save a lot of money
I can live with it
Really scary and hard to stop
© Big Sky Associates, Inc.
Security Silos = Detection Failure
Information
Failed authentications
Authentications / Sec
Authorizations / Min
Physical
Door Entries / Min
Location access patterns
Physical security violations / day
Personnel
Performance risk ratings
Background risk score
Credit Rating
© Big Sky Associates, Inc.
Integrated Security = Prediction
Information
Failed authentications
Authentications / Sec
Authorizations / Min
Physical
Door Entries / Min
Location access patterns
Physical security violations / day
Personnel
Performance risk ratings
Background risk score
Credit Rating
© Big Sky Associates, Inc.
Decision Analytics
Strategy
Technique
Technology
Execution
© Big Sky Associates, Inc.
Strategy
Technique
Technology
Execution
© Big Sky Associates, Inc.
Strategy
Technique
Technology
Execution
© Big Sky Associates, Inc.
Strategy
Technique
Technology
Execution
© Big Sky Associates, Inc.
Strategy
Technique
Technology
Execution
© Big Sky Associates, Inc.
© Big Sky Associates, Inc.
Homework
© Big Sky Associates, Inc.
1. Huddle2. Rank your threats
3. Collect Data
© Big Sky Associates, Inc.
© Big Sky Associates, Inc.
To get the details and the notes with the slides, contact me here or email me at [email protected]