Beruflich Dokumente
Kultur Dokumente
Security Threats
Presented by
Franklin Akindejoye
87706
Introduction
BYOD threats
Have a BYOD policy.
Identify responsibilities up front.
Consider segmented services or
networks.
Use mobile device management.
Mandate standard security settings.
Mandate application/operating system
updates.
Educate users.
Have a security incident plan.
Use monitoring.
Conclusion
Insider threats begin with trusted employees
whose frustration, resentment, apathy, lack of
cybersecurity training and awareness, or external
motivations radicalize them to unintentionally or
willfully inflict harm on the organization by
compromising systems, assisting external cyber-
threat actors in multi-vector information warfare, or
exfiltrating treasure troves of valuable PII, PHI, and
other sensitive data.
Perimeter-based defenses cannot stop the threats
who are already inside the network. Bleeding-edge
defense-grade insider threat solutions, such as
User Behavioral Analytics (UEBA), Identity and
Access Management (IAM), and User Activity
Monitoring (UAM), are necessary to detect, deter,
and mitigate the mounting insider threat epidemic
against critical infrastructure.
References
http://b2b.cbsimg.net/downloads/Gilbert/TR_EB_insider_threats.pdf
https://icitech.org/wp-content/uploads/2017/02/ICIT-Brief-In-2017-The-Insider-Threat-E
pidemic-Begins.pdf
https://pixabay.com/