Time
1 hour 5 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:10
When building a modern insider threat program, you should ask yourself two key questions. First, who has the most to lose from an insider threat incident
00:21
and second, who will be involved in the investigation and response to an insider threat incident
00:28
and insider threat program should be more than just one person. It should be a collaborative effort between you and the individuals or teams who are either affected by an insider threat incident or investigating and responding to that insider threat incident.
00:45
And because no course would be complete without an acronym, Let me lay this one on you.
00:51
It's wig.
00:53
The Insider Threat Working Group, Your next step in building a modern insider threat program.
01:00
The Insider Threat Working Group, The It wig. Fun acronym. No need to thank me. You're welcome is a group whose mission is to develop your organization's program for addressing the challenge of insider threat.
01:14
Among other things, they're key in getting executive buy in building consensus among stakeholders and working closely with the General Consul and HR to develop your insider threat program policies.
01:29
But who exactly should be in this it wig?
01:33
Okay, maybe that's not as fun to say anymore. Let's just call it the working Group.
01:38
Ideally, the working group should be composed of stakeholders representing I t. Security, finance, risk, human re sources and legal.
01:49
Additionally, you may wish to include some line of business data owner representatives,
01:53
but let's hear from Thant Thorson and what he has to say about building out your working group.
02:01
When talking with the stakeholders or potential stakeholders, you need to determine what would happen if in incident occurred.
02:07
What are the ramifications of the loss of the assets or intellectual property?
02:13
Would there be a significant loss of revenue? Lots of reputation,
02:16
maybe all the above
02:19
and thinking about your investigations and response? Consider the participants in those processes or work flows. Are you going to be working with HR Legal? Will security be looped in for certain situations?
02:30
Who gets involved if there's a broader cyber threat discovered?
02:34
Working through these hypothetical case scenarios will help identify which groups need to be a part of the insider threat. Working group
02:40
Membership in the working group will vary depending on your organizational structure and should strike a good balance between the data stakeholders and those involved in the investigation process.
02:53
Ultimately, you don't want to have your goals undermined by too many competing priorities
03:00
again.
03:00
Todd Thorson.
03:02
Your group should be comprised of people have knowledge in what type of data and assets their teams using share and where their most sensitive assets or data reside.
03:13
Once these people are identified, you may need to provide them additional training from across a number of security and regulatory topics, so they better understand how they will be key players in an incident Response.
03:24
You're working group should be skilled in a number of areas, including
03:30
security fundamentals.
03:32
This includes knowledge of the corporate security policy and relevant security standards, including access controls, cyber threats and risk management.
03:44
If applicable, some additional training may be needed in various security disciplines, such as hardware, software application and network
03:54
conducting response actions.
03:58
While input for conducting response actions will be provided by all members of the group,
04:03
someone in the group should have experience with response actions,
04:10
retaining, safeguarding and the use of records and data.
04:14
The safeguarding of records is more than just having backed up data,
04:17
but we'll also include where and for how long evidence for investigations should be handled.
04:25
Civil liberties and privacy laws fall within the purview of human resource is, or your legal department who can assist with portions of the response of actions taken.
04:36
And finally, any applicable laws and regulations.
04:42
Your legal counsel at insight for any applicable laws and regulations.
04:46
They should be a key player in determining when law enforcement should be engaged in any issue.
04:54
Since it's highly unlikely that you'll find all these disciplines in a single person, make sure everyone is aware of the time commitments and the training needed to be part of the insider threat Working group.
05:06
The mission of your working group is to get executive buy in, build consensus among the stakeholders and work closely with the general counsel and HR to develop your insider threat programs policies.
05:20
The group should be composed of people with significant specialization in their areas and will have valuable input in creating your program.
05:30
Think about which individuals or teams within your organization stand to lose the most from an insider incident.
05:38
Think about who should be involved in investigating and responding when an incident occurs.
05:45
Identify and engaged line of business leaders
05:47
HR legal and other I T leaders as key stakeholders.
05:54
Finally, you may need to provide your group members additional training, so be sure they're comfortable with the time commitments of participating in the group. Okay, your it wig.
06:05
Okay. It's still fun to say your insider threat Working group is ready to get to work
06:12
and one of their biggest tasks getting executive buying.

Up Next

8 Steps to Building a Modern Insider Threat Program

In this course brought to you by Industry Leader Code42, we will cover the 8 crucial steps necessary to build a modern insider threat program for your organization.

Instructed By

Instructor Profile Image
Alex Matheson
Instructor