Page 147 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 147
The traditional norm or mindset that malicious Insiders just steal classified information, an organizations
data, trade secrets or other sensitive information, is no longer the case. There continues to be a drastic
increase in financial fraud, embezzlement, shell company - fake invoicing schemes, contracting fraud,
bribery, kickbacks and more. This is very evident in the Insider Threat Incidents Reports that are produced
monthly by the NITSIG and the ITDG.
To grasp the magnitude of the Insider Threat problem, one must look beyond Insider Threat surveys,
reports and other sources that all define Insider Threats differently. How Insider Threats are defined and
reported is not standardized, so this leads to significant underreporting on the Insider Threat problem.
Surveys and reports that simply cite percentages of Insider Threats increasing, do not give the reader a
comprehensive view of the actual malicious actions employees’ are taking against their employers. Some
employees’ may not be disgruntled / malicious, but have other opportunist motives such as financial gain,
to live a better lifestyle or supporting their gambling addictions, etc.
The severe damages from employees' can be into the MILLIONS and BILLIONS, as referenced in the
reports on the link below. Companies have also had large layoffs or gone out of business because of the
malicious actions of employees. The damages caused by employees can happen in an organization,
from big to small, from U.S. Government to private sector businesses.
These Insider Threat incidents are not just caused by JUST 1 EMPLOYEE. In some case multiple
employees may be involved, or employees may be in collusion with external cyber criminals or
conspirators.
Some organizations invest thousands of dollars in securing their data, computers and networks against
Insider Threats, from primarily a technical perspective, using Network Security Tools or Insider Threat
Detection Tools. But the Insider Threat problem is not just a technical problem. If you read any of these
monthly reports, you might have a different perspective on Insider Threats.
Could your organization rebound / recover from the severe impacts that an Insider Threat incident can
cause?
These monthly reports are recognized and used by Insider Risk Program Managers and security
professionals working for major corporations, as an educational, guidance and support tool to: 1) Gain
support from CEO's, C-Suite, key stakeholders and supervisors for developing or enhancing an Insider
Risk Management (IRM) Program. These reports provide the justification, return on investment and the
funding that is needed for an IRM Program. 2) Provide Insider Threat Awareness Training to the
workforce on the importance of reporting employees’ who may pose a risk or threat to the organization.
3) Review and enhance security controls (Non-Technical, Technical) to protect the organization from the
many different types of Insider Threats.
Download Reports / No Registration Required
www.insiderthreatincidents.com
If you would like to receive the monthly Insider Threat Incidents Reports via email, please send your
request to: [email protected] to be added to the distribution list.
147