Steve Thomas · @Gladiator
83 followers · 605 posts · Server universeodon.com

If you missed our Microsoft State & Local Government Compliance Webinar series episode on February 2nd, have no fear! You can catch the recording here on our Microsoft SLG YouTube channel.

"What is Insider Risk Management/Incident Response, and why should we spend time on it?"

Andrea Fisher & Richard Beserra demonstrate how you can effectively protect your digital data estate from insider threats leveraging Microsoft's security and compliance tools.

youtube.com/watch?v=7hMoTRY6Ay

#compliance #insiderrisk #microsoftpurview #microsoftsentinel #microsoftdefender #microsoft365

Last updated 2 years ago

Steve Thomas · @Gladiator
73 followers · 415 posts · Server universeodon.com

Because not all the potential insider risks become incidents or breaches, quickly identifying the most critical insider risks and prioritizing resources to investigate and mitigate them is crucial to reducing impact from incidents. techcommunity.microsoft.com/t5

#purview #insiderrisk #microsoft365 #compliancemanagement

Last updated 3 years ago

ITSEC News · @itsecbot
1130 followers · 33215 posts · Server schleuss.online

LATEST CYBERTHREATS AND ADVISORIES - JANUARY 13, 2023 - Cybercriminals attack schools, the FCC looks to change data breach rules and artif... blog.isc2.org/isc2_blog/2023/0

#ransomware #insiderrisk

Last updated 3 years ago

Loose and Work In Progress Thoughts Related to in the context of / / :

Insider Threats are not solely an effect of remote work, but the advent of remote work compounds them. There is no turning back to in-office only work, so how can organizations protect themselves from Insider Threats in what has become a larger attack surface?

Collaboration Tools: A fragmented landscape including multiple cloud tools and services including Google Drive, iCloud, Box, Dropbox, and OneDrive. The problem is not the spirit of collaboration or the tools. It’s the approach to managing sensitive data and having visibility of it. Traditional Information security relies on blocking access. While sometimes effective, locked-down employees are not productive employees. Organizations need collaboration tools to stay ahead, and they also need them to maintain employee satisfaction in a highly competitive labor market.

The nature of work for digital creatives has fundamentally changed. There is no predictable time intervals when all workers are online or supposed to be online. This makes traditional approaches of static behavior matching obsolete. The rise of cloud collaboration technologies expands the risk surface and makes “expected” behavior more ambiguous than ever. Complete visibility into behavior is now needed across platforms but continues to be centered around the behaviors triggered by an endpoint or workstation.

Traditional Approaches
- Blocking: This leads to exceptions and is intrusive for a collaborative culture.
- Static Ringfencing of Data and Digital Assets is no longer Possible
- Constant re-org
- Distributed nature
- Complexity and Dynamism of Required Access Controls
- Classification: Can’t keep up with the dynamism of an organization. Requires significant up-front effort for initial classification and ongoing overhead to maintain the state.

If you are directly or tangentially working on these problems would love to connect and learn more from your experiences in the space.

#insiderrisk #insiderthreats #infosec #cybersecurity #risk

Last updated 3 years ago

ITSEC News · @itsecbot
856 followers · 32557 posts · Server schleuss.online
ITSEC News · @itsecbot
856 followers · 32557 posts · Server schleuss.online

- Lisa Forte Keynote: Insider Threats A Bigger Challenge Than Ever - In one of the most sobering presentations about the current state of security deli... feedproxy.google.com/~r/isc2Bl #(isc)²events

#insiderrisk #ISC2Congress

Last updated 4 years ago

ITSEC News · @itsecbot
738 followers · 32490 posts · Server schleuss.online

Exceptions to Security Policy - What are and how to deal with them? - By Yuri Braz, CISSP, CRISC, PMP
Information Security, or cybersecurity, has become more relevant ev... feedproxy.google.com/~r/isc2Bl

#insiderrisk #networksecurity

Last updated 5 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online

Security Predictions for 2021from the (ISC)² Community of Security Professionals (PART 1) - By Diana-Lynn Contesti, CISSP-ISSAP, ISSMP, CSSLP, SSCP, John Martin, CISSP-ISSAP, and Richard Nealo... feedproxy.google.com/~r/isc2Bl

#privacy #ransomware #insiderrisk #cybersecurityworkforce

Last updated 5 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online

The Human Element of Zero Trust - One weak link in a chain is all that’s needed to topple a cyberdefense. Sometimes this comes down to... feedproxy.google.com/~r/isc2Bl

#itsecurity #insiderrisk #cloudsecurity #cybersecurityworkforce

Last updated 5 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online

The First Line of Defense: Are Humans Doing a Good Enough Job? - As published in the March/April 2020 edition of InfoSecurity Professional Magazine
By Crystal Bedell... more: feedproxy.google.com/~r/isc2Bl

#itsecurity #insiderrisk

Last updated 6 years ago