The SANS 2017 Insider Threat Survey: Mounting an Effective Defense Against Insider Threat

  • Webcast Aired Tuesday, 01 Aug 2017 1:00PM EDT (01 Aug 2017 17:00 UTC)
  • Speakers: Eric Cole, PhD, Pramod Cherukumilli, Matt Hathaway, Bryan Ware

Information security pros consistently rate insider threats as one of their top concerns, but often don't do much about it. According to the results of the 2015 SANS insider threat survey, 74% list insiders as among their top concerns, with 34% admitting to having been a victim of a successful insider breach that is estimated to cost their organization more than $1 million.

Breaches caused by the misuse of insider credentials are so difficult to spot that 70% aren't noticed for months, according to the 2016 Verizon Data Breach Investigations Report. Sixty-three percent of breaches involving privileged access involved weak or stolen passwords, which is why the rapid growth of phishing and other credential-stealing tactics are growing so quickly.

When it comes to preventing insider attacks, "prevention is more a state of mind than reality," according to SANS expert Eric Cole, Ph.D., author of the 2015 report Insider Threats and the Need for Fast and Directed Response. "Many organizations are still not creating and implementing insider threat programs and need to aggressively increase their focus to better protect the organization," Dr. Cole wrote in 2015. "They need to take aggressive steps to implement administrative and technical solutions for controlling the damage an insider can cause."

This webcast will explore the survey results with emphasis on: '

  • Top concerns related to internal threats
  • What insider threat programs entail
  • Maturity of such programs
  • Tools used to detect and deter insider threats
  • Whether organizations have improved their abilities to stop malicious insiders without interfering with those doing their jobs

Register for this webcast and be among the first to find out the results of this year's survey of the SANS community and Eric Cole's evaluation of their ability to deter insiders.

View the associated white paper here.