1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: Use frameworks to develop insider threat policy

Discussion in 'CSO' started by RSS, Apr 13, 2016.

  1. RSS

    RSS New Member Member

    The typical employee at your enterprise works 8-5. They login, access the server, access the intranet, maybe login to Facebook once or twice. Pretty routine behaviors.

    What do you do, though, when those behaviors start to deviate just a little bit?

    Dave Barton, CISO at Forcepoint said, "Security is driven by the ability to determine what normal user behavior looks like. When that behavior starts to deviate, they should start questioning, 'Why are they looking there? Why are they downloading source code?'"

    A strong insider threat program encompasses a couple of things, one of which is behavior analytics. "Being able to detect when there is a deviation and how to respond to that deviation," said Barton.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page