Dealing with insider risk in the era of remote work
2021-05-24 21:57:45 Author: www.forcepoint.com(查看原文) 阅读量:150 收藏

Forrester Insider Threat Assessment

Forrester and Forcepoint together recently conducted a study to understand insider threat initiatives worldwide with 300 decision-makers.

We used the results to create an insider threat maturity model that mapped various attributes to organizational capabilities. These results highlighted various strengths of high-maturity organizations e.g. these organizations using more indicators to detect insider threats.

They are much more likely to collaborate with Human Resources on this front and monitor attempts to obfuscate sensitive data and abnormal network or system reconnaissance activities.

Forrester Report - Insider Threat Initiatives

On the other hand, a large share of companies in the low maturity category still think of themselves as mature and consider their technology effective, although many of them are lacking collaboration between stakeholders. These organizations experience difficulties setting up processes in a way that doesn't impede employee productivity while not violating their privacy. Additionally, low maturity companies are often not able to enforce the defined policies to protect data and systems.

One other insight from the survey: it is critical that organizations be transparent with their employees as they evolve their insider threat programs, including what is being monitored, what kicks off an investigation and who has access to data and how the data is used.

To ensure true data protection across endpoint, infrastructure, and cloud security, leaders not only have to provide secure access to enable work from everywhere but also understand the insider risk and adopt automated risk adaptive data protection technology that secures data at rest, in-motion, and in-use across hybrid environments.

Take the short 5-minute self-assessment to see how your organization’s insider threat program compares to your peers. In return, you’ll receive actionable steps to advance your insider threat maturity.


文章来源: https://www.forcepoint.com/blog/insights/forrester-insider-threat-study
如有侵权请联系:admin#unsafe.sh