HomeCyber BalkansThe importance of program location in determining insider risk management focus

The importance of program location in determining insider risk management focus

Published on

spot_img

The ever-evolving nature of insider risk management (IRM) has led to questions about where the program should sit within an organization to maximize its effectiveness. The answer seems to be clear: the program should reside within the information security realm. At a recent Insider Threat Summit, it was agreed that the information security department is best equipped to handle the task as it is where all data resides. The focus of IRM programs varies based on where they are situated within the organization. IT/Infosec/CISO carries a technology-forward bent, HR or legal has a more human bent, while physical security places an emphasis on the physical facilities.

In a study of 18 industry organizations, MITRE found that insider risk programs were owned by general counsel or the legal department, human resources, information security, security and/or threat management, or risk management. The choice is still important as it impacts the program’s mission, access, and priorities.

According to Joe Payne, CEO of CODE42, an IRM program should have a “leadership team of CISO, chief of HR, and general counsel.” While more than half of IRM programs reported directly to a member of the C-suite, CEOs would prefer to have positive messaging around these programs as they do not want to project negativity towards their employees. CISOs also do not enjoy monitoring their colleagues, leading to the idea of spreading ownership of IRM programs.

A close-knit collaboration between the legal, HR, and information security teams is essential regardless of where the IRM program resides. The provision of facts and evidence in a consumable and easy-to-understand fashion is key to the success of an accurate investigation when time is of the essence.

An IRM team reporting to legal can earmark each case as having a sponsor – the entity that is levying the charges. The IRM team can then pull in resources from IT/infosec, security, finance, etc. to acquire the facts and evidence. This approach filters out bias and results in a consistent playbook in addressing each and every investigation.

The bottom line is this: if an organization is going to accuse an employee of stealing data, they need to do so with a high degree of confidence based on facts. IRM programs should be handled by a team that can work collaboratively and efficiently to acquire and analyze data. By leveraging the strengths of various departments, IRM programs can minimize risks and protect an organization’s sensitive data and assets.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...