Page 25 - the SyI Quarterly 13 - (V4)
P. 25

Our  Membership










                                                               What were the concerns, and what did the
                                                               research say?
 Organisational Resilience -                                   An anonymous online questionnaire was
                                                               developed to assess the perception of insider
 Insider Risk.                                                 risk amongst security industry specialists who
                                                               were all members of an acclaimed security
                                                               institute with a stringent membership criterion
                                                               and a professional code of conduct.
 - By Keith Johnson MSyl                                       The participants who volunteered to complete

                                                               the questionnaire had no prior knowledge of
                                                               the assessment questions, nor were they aware
 Description of insider risk                                   of any analysis of their responses.  The author
 Insider risk is posed by individual(s) with access
 or knowledge used to damage, deprive, diminish,               also developed and conducted semi-structured
                                                               primary research interviews with recognised
 injure or interrupt organisations, including their            and professionally respected security industry
 employees, stakeholders, assets, materials, critical          experts who shall also remain anonymous.
 processes, information systems, intellectual
 property, brand and reputation.
                                                               An interesting opinion highlighted in response to
                                                               the questionnaire was that it was perceived that
 A common element of insider risks (or insider                 an accidental or unintentional incident caused by
 attacks) is that the perpetrator(s) has or has                an onboarded employee was more of a concern
 formerly had a trusted position and obtained                  than an external player seeking to commit a
 privileged access to potentially sensitive
 information or essential equipment that is then               hostile insider attack.
 exploited with the intent to harm the facility, the           The author believes three main themes, activities,
 organisation, its operations or the environment.
                                                               and challenges are associated with addressing
                                                               insider risk.
 Insider incidents have been trending upwards
 during recent years, influenced by the growing                The three themes are.
 contractor and outsourced economies, remote
 and hybrid workforces, and employees with                     •  The first theme consists of identifying
 access to cloud-based applications lacking                        patterns and trends of insider crimes.
 sufficient security precautions. Each element
 provides an opportunity for both accidental and               •  The second theme is the methods and
                                                                   motives used for insider activities.
 malicious insider security breaches.
                                                               •  The third theme is the organisational
                                                                   response and resilience against insider risks.
 What was intended to be achieved?
 The perpetual occurrence of insider incidents
 in both the public and private sectors led the                The three primary types of insider activity are
 author to develop a research questionnaire                    •  The theft of information or assets for
 and undertake semi-structured interviews                          personal advantage or personal financial
 to investigate how conventional insider risk                      gain.
 mitigations are applied and how effective they are
 perceived to be. The author also explored how                 •  The second activity is the theft of assets and
                                                                   modification of information for commercial or
 the detection of insider threats can be actively                  state advantage.
 recognised or predicted, with the research aim to             •  Thirdly, the sabotage of assets or destruction
 suggest enhancements to existing insider threat                   of information, including damage and
 mitigation strategies.
                                                                   destruction of either physical or virtual
                                                                   systems.





 24                                                         25
   20   21   22   23   24   25   26   27   28   29   30