Page 24 - the SyI Quarterly 13 - (V4)
P. 24

Our  Membership










                                                                                                                                                                                          What were the concerns, and what did the
                                                                                                                                                                                          research say?
              Organisational Resilience -                                                                                                                                                 An anonymous online questionnaire was
                                                                                                                                                                                          developed to assess the perception of insider
              Insider Risk.                                                                                                                                                               risk amongst security industry specialists who
                                                                                                                                                                                          were all members of an acclaimed security
                                                                                                                                                                                          institute with a stringent membership criterion
                                                                                                                                                                                          and a professional code of conduct.
              - By Keith Johnson MSyl                                                                                                                                                     The participants who volunteered to complete

                                                                                                                                                                                          the questionnaire had no prior knowledge of
                                                                                                                                                                                          the assessment questions, nor were they aware
            Description of insider risk                                                                                                                                                   of any analysis of their responses.  The author
            Insider risk is posed by individual(s) with access
            or knowledge used to damage, deprive, diminish,                                                                                                                               also developed and conducted semi-structured
                                                                                                                                                                                          primary research interviews with recognised
            injure or interrupt organisations, including their                                                                                                                            and professionally respected security industry
            employees, stakeholders, assets, materials, critical                                                                                                                          experts who shall also remain anonymous.
            processes, information systems, intellectual
            property, brand and reputation.
                                                                                                                                                                                          An interesting opinion highlighted in response to
                                                                                                                                                                                          the questionnaire was that it was perceived that
            A common element of insider risks (or insider                                                                                                                                 an accidental or unintentional incident caused by
            attacks) is that the perpetrator(s) has or has                                                                                                                                an onboarded employee was more of a concern
            formerly had a trusted position and obtained                                                                                                                                  than an external player seeking to commit a
            privileged access to potentially sensitive
            information or essential equipment that is then                                                                                                                               hostile insider attack.
            exploited with the intent to harm the facility, the                                                                                                                           The author believes three main themes, activities,
            organisation, its operations or the environment.
                                                                                                                                                                                          and challenges are associated with addressing
                                                                                                                                                                                          insider risk.
            Insider incidents have been trending upwards
            during recent years, influenced by the growing                                                                                                                                The three themes are.
            contractor and outsourced economies, remote
            and hybrid workforces, and employees with                                                                                                                                     •  The first theme consists of identifying
            access to cloud-based applications lacking                                                                                                                                       patterns and trends of insider crimes.
            sufficient security precautions. Each element
            provides an opportunity for both accidental and                                                                                                                               •  The second theme is the methods and
                                                                                                                                                                                             motives used for insider activities.
            malicious insider security breaches.
                                                                                                                                                                                          •  The third theme is the organisational
                                                                                                                                                                                             response and resilience against insider risks.
            What was intended to be achieved?
            The perpetual occurrence of insider incidents
            in both the public and private sectors led the                                                                                                                                The three primary types of insider activity are
            author to develop a research questionnaire                                                                                                                                    •  The theft of information or assets for
            and undertake semi-structured interviews                                                                                                                                         personal advantage or personal financial
            to investigate how conventional insider risk                                                                                                                                     gain.
            mitigations are applied and how effective they are
            perceived to be. The author also explored how                                                                                                                                 •  The second activity is the theft of assets and
                                                                                                                                                                                             modification of information for commercial or
            the detection of insider threats can be actively                                                                                                                                 state advantage.
            recognised or predicted, with the research aim to                                                                                                                             •  Thirdly, the sabotage of assets or destruction
            suggest enhancements to existing insider threat                                                                                                                                  of information, including damage and
            mitigation strategies.
                                                                                                                                                                                             destruction of either physical or virtual
                                                                                                                                                                                             systems.





                                                              24                                                                                                                       25
   19   20   21   22   23   24   25   26   27   28   29