September is National Insider Threat Awareness Month which is a collaborative effort between the National Counterintelligence and Security Center (NCSC), National Insider Threat Task Force (NITTF), Office of the Under Secretary of Defense Intelligence and Security (USD(I&S)), Department of Homeland Security (DHS), and Defense Counterintelligence and Security Agency (DCSA) to emphasize the importance of detecting, deterring, and reporting insider threats.
The world has changed exponentially this year and with organizations and individuals under intense levels of pressure, the risk of Insider Threat has never been so topical. Are you confident that your organization is resilient to the risk of insiders? Have you identified and secured your most valuable assets and Intellectual Property?
To support National Insider Threat Awareness Month, FTI Cybersecurity has a series of thought leadership content to assist in building the required level of resilience to this rising threat.
The Expert Briefing Podcast – Insider Threat
Head of Cybersecurity for EMEIA Joshua Burch is joined by colleagues Kyung Kim, Almira Cemmell, Steve Morgan and Dave Best. The team delve into the topic of Insider Threat, discussing how awareness training, coordinated communication channels and education programs help mitigate the risk. Throughout the episode, the experts offer their guidance on the current trends and real-life examples they are seeing. Listen here.
Insider Threat and How to Mitigate It – 5 Top Tips
Managing Director, Steve Morgan provides 5 top tips for business leaders on how to mitigate the risk of insider threat. In today’s digital age — where hackers can override a system from the other side of the globe — organizations must be warier than ever. Unfortunately, it’s no longer enough to remain vigilant of the outside world. Some of the most damaging threats originate from within. Read article.
Ask the Expert: How Do I Respond to an Insider Attack?
In this FTI Journal article, Kyung Kim, Head of Cybersecurity for APAC, discusses five steps organizations should take after they’ve discovered that an insider is responsible for a cyber breach. Read article.