The insider threat is one of those persistent challenges in cybersecurity. One example that how just how insidious the threat is, Code42’s president, Joseph Payne, cited occurred recently in the formation of a new device market. Payne asks. We imagine we’re an executive at a company developing new wearable technologies. And everyone’s hopes and dreams at the company are being poured into this technology. And then a couple of employees leave. Nothing strange there. But they go and work for a competitor. That may be eyebrow-raising, but still not surprising.However, features the engineering teams sweated over to create ended up within the competitor's products. Now that’s troubling. So troubling that the business goes under. “That may sound like a hypothetical,” says Payne. “But that's precisely what happened to the folks at Jawbone. When people left Jawbone and went over to Fitbit. Jawbone does not exist today. The stakes around insider threats can be really, really high,” he says.Fortunately, there is some good news about this story. The technology used to mitigate insider risk has matured considerably in recent years.
As Payne explains, the legacy way of mitigating the insider risk was to lock down the entire network and try to block everything from leaving, and let's not let people collaborate or work together. But much like that approach does not work for external threats, we can't rely on locking that level of sharing and collaboration up to keep insider threats at bay. “It simply doesn't work. It's just too easy to [move] data outside of the network today,” Payne explains.Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds