infographic - the insider threat landscape

2
+44 (0)203 823 9030 @CyberseerNet Sources: W: T: Cyberseer is a managed security service and solutions provider with a comprehensive suite of smart technology and threat intelligence service. We work with clients to develop flexible and dependable cyber security solutions that support enterprises across the UK. Publicised insider data theft incidents, such as the Morgan Stanley breach or Edward Snowden case, highlight the growing need for better security practices and solutions to reduce the risks posed by insider threats. such as managers with access to sensitive information, pose the biggest insider threat to organisations. plugging in an infected device or known device into a corporate network has increased risk of corporate data being stolen. Outsourcing, third-party technologies and cloud computing increase the attack surface. Attackers know the best way to infiltrate an organisation is through its trusted insiders. Employees with a high degree of access to the corporate network can be identified using social media. 56% endpoints Databases File Servers Mobile Devices Endpoints Business Applications Network Cloud Application 52% sensitive financial data 57% customer data 54% intellectual property 46% company data 45% employee data 30% sales & marketing data 20% healthcare data Intentionally harms the organisation, by stealing data, commerical secrets and intellectual property. Unwitting employees enable external attack. Not deliberately malicious, but actions result in damaging consequences. 35% files servers 22% cloud applications 22% databases 22% business applications IT Pro’s were asked ‘What IT assets are most vulnerable to insider attacks?’ IT Pro’s were asked ‘What types of data are most vulnerable to insider attacks?’ IT Pro’s were asked ‘What IT assets are most commonly used to launch insider attacks from??’ 43% network 42% mobile devices Increased Costs Increased Fines Lawsuits Impacted Revenues Reputational Damage (from customer & market perspective) Compromised Shareholder Confidence When determining insider threat activity is a lack of contextual information from security tools. Monitor Detect Analyse Eradicate Threat X www.cyberseer.net www.infosecbuddy.com/wp-content/uploads/2015/06/Insider-Threat-Report-2015.pdf; http://www.prnewswire.com/news-releases/ponemon-institutes-2015-global-cost-of-data-breach-study-reveals-average-cost-of-data-br each-reaches-record-levels-300089057.html; http://www.infosecbuddy.com/wp-content/uploads/2015/06/Insider-Threat-Report-2015.pdf http://www.cbronline.com/news/cybersecurity/data/insider-threat-20-of-office-workers-would-sell-corporate-passwords-to-third-parties-48 44299? INSIDER THREAT LANDSCAPE 256 DAYS What are they? Why are Insider Threats on the Rise? Top Types of Insider Threat: IT Assets at Risk: Data Most Vulnerable to Insider Attacks: Launch Points for Insider Attack: Privileged Users Third Party Associates & Contractors Regular Employees BYOD Open Networks Social Engineering 62% of security pro’s say insider threats have become more frequent in the last 12 months. Regardless of motivation of the insider, business impacts are universal: Malicious Compromised Negligent 57% 55% 44% 42% 41% 36% 31% £ 010100010 000101010010 01010100101 + ? ? ? Insider Threats are left undetected for: 20% of office workers would sell corporate paswords to third parties. £ £ £ £ Biggest Hurdle Take Action Content Aware Security Contact Us: Discuss the threats affecting your network:

Upload: elizabeth-gladen

Post on 13-Apr-2017

84 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Infographic - The Insider Threat Landscape

+44 (0)203 823 9030 @CyberseerNet

Sources:

W:T:

Cyberseer is a managed security service and solutions provider with a comprehensive suite of smart technology and threat intelligence service. We work with clients to develop flexible and dependable cyber security solutions that support enterprises across the UK.

Publicised insider data theft incidents, such as the Morgan Stanley breach or Edward Snowden case, highlight the growing need for better security practices and solutions to reduce the risks posed by insider threats.

such as managers with access to sensitive information, pose the biggest insider threat to organisations.

plugging in an infected device or known device into a corporate network has increased risk of corporate data being stolen.

Outsourcing, third-party technologies and cloud computing increase the attack surface.

Attackers know the best way to infiltrate an organisation is through its trusted insiders. Employees with a high degree of access to the corporate network can be identified using social media.

56% endpoints

DatabasesFile Servers

Mobile DevicesEndpoints

Business ApplicationsNetwork

Cloud Application

52% sensitive financial data

57% customer data

54% intellectual property

46% company data

45% employee data

30% sales &marketing data

20% healthcare data

Intentionally harms the organisation, by stealing

data, commerical secrets and intellectual

property.

Unwitting employees enable external attack.

Not deliberately malicious, but actions result in

damaging consequences.

35% files servers22% cloud applications22% databases22% business applications

IT Pro’s were asked ‘What IT assets are most vulnerable to insider attacks?’

IT Pro’s were asked ‘What types of data are most vulnerable to insider attacks?’

IT Pro’s were asked ‘What IT assets are most commonly used to launch insider attacks from??’

43% network

42% mobile devices

Increased Costs Increased Fines

Lawsuits

Impacted Revenues

Reputational Damage (from customer & market perspective)

Compromised Shareholder Confidence

When determining insider threat activity is a lack of contextual information from security tools.

Monitor Detect

AnalyseEradicateThreat X

www.cyberseer.net

www.infosecbuddy.com/wp-content/uploads/2015/06/Insider-Threat-Report-2015.pdf; http://www.prnewswire.com/news-releases/ponemon-institutes-2015-global-cost-of-data-breach-study-reveals-average-cost-of-data-breach-reaches-record-levels-300089057.html; http://www.infosecbuddy.com/wp-content/uploads/2015/06/Insider-Threat-Report-2015.pdfhttp://www.cbronline.com/news/cybersecurity/data/insider-threat-20-of-office-workers-would-sell-corporate-passwords-to-third-parties-4844299?

INSIDER THREATLANDSCAPE

256DAYS

What are they? Why are Insider Threatson the Rise?

Top Types of Insider Threat: IT Assets at Risk:

Data Most Vulnerableto Insider Attacks:

Launch Points forInsider Attack:

Privileged Users

Third Party Associates & Contractors

Regular Employees

BYOD

Open Networks

Social Engineering

62% of security pro’s sayinsider threats

have become more frequent in the last 12 months.

Regardless of motivation of the insider, business impacts are universal:

MaliciousCompromised

Negligent

57%55%

44%42%41%

36%31%

£01010001000010101001001010100101

+

???

Insider Threats are left undetected for: 20%

of office workers

would sell corporatepaswords to third parties.

££

£

£

Biggest Hurdle Take Action

Content AwareSecurity

Contact Us:

Discuss the threats affecting your network:

Page 2: Infographic - The Insider Threat Landscape

INSIDER THREATLANDSCAPE