Detecting And Mitigating

Detecting And Mitigating

Search for the key that will minimize risk

Insider threat has become an increasingly prevalent concern for organizations, and the damage from breaches caused by current or former employees, contractors or partners misusing access credentials can be devastating.

Despite the very real risk, many organizations are not certain whether the policies and processes they employ, such as candidate screening and background checks, are adequate for identifying potential problems. While they recognize the risk presented by insider threat, they may not be confident in their ability to detect, or what solutions are the most effective for prevention. Some organizations may also be hesitant to monitor employees for insider threat for fear of causing dissatisfaction or interfering with their ability to perform their jobs. That type of thinking may well lead to negative repercussions at some point.

They say that the first step in solving any problem is to understand that there’s a problem in the first place, which bodes well given the recognition of the need for protection from insider threat. It is the next steps—understanding what constitutes insider threat, prevention, detection and response—that merit further discussion.


Insider threat or attack covers a full spectrum of actions, ranging from wide-scale catastrophic incidents to those that are less severe but still damaging in some way. Most notably are the high-profile, well-publicized attacks like the Sony breach, which was found to have been the result of insider attack because trusted credentials were used. But while these breaches can be devastating, not all insider threat is as obvious. It might be as simple as a sales rep who takes an account list when leaving a job, a programmer who takes a piece of proprietary code, or even an employee who deletes important emails prior to resigning. Given the complex psychology that plays into these and other threats, it can be difficult to understand, let alone mitigate or avoid potential problems.

Here are three key factors in addressing and mitigating insider threat, along with best practices for effectively accomplishing each.


The first step in addressing insider threat is prevention, which begins with a formalized program to address the issue. To do this, organizations must develop strong policies or revisit those already in place using enterprise-wide risk assessments to consider threats from insiders and trusted business partners.

In addition to policies, organizations must also have a strong understanding of the assets and locations that must be protected, as well as the risk level associated with each. For example, data centers and control rooms would be labeled as the highest priority for protection, while office supply rooms could lie on the opposite end.

Credentialing is another major part of prevention. Badges must be issued with access privileges that are specific to each individual, department and/or job title. The most diligent approach organizations can employ when approaching insider threat prevention is the “least privilege” concept. Enforcing a strict separation of duties among employees ensures each individual is given the lowest level of access needed to perform their jobs, making it impossible for employees to use their credentials to enter areas or access assets that should be available only to management or security staff.

Effective prevention measures include periodic security training for employees. Focused training can help them understand that insider threat prevention is a risk that everyone in the organization shares and employees are being entrusted with this responsibility as part of the team. The right training and awareness program can help employees see security as a provider of services that eases access requests and other processes with automation. Once they can view security as a positive, employees become a valuable part of detection, which is the second – and often most challenging – factor in mitigating insider threat.


The main key to detection is to implement strong metrics for measuring usage and identifying potential problems. Along with metrics, it is important to institute stringent access controls and monitoring policies to develop and rank potential risk factors that will help focus ongoing activities. There are a number of ways organizations can accomplish these goals, including passively monitoring for misused credentials or monitoring and responding to suspicious or disruptive behavior.

Analysis of credential usage helps establish employees’ typical patterns. Any action outside of that norm will flag the system of a potential insider threat, which can then be monitored to determine if that is the case or whether there is a harmless explanation for this deviation. If the threat is real, security can work to avoid it altogether.

Employees can play a major role in effective insider threat detection but getting them to participate can be difficult if they feel like they’re being watched or that they aren’t trusted. A good first step is to initiate regular security training and make clear that any reporting is confidential. When people feel like a trusted member of the team, they are more willing to participate in the “if you see something, say something” aspect of detection.


The final step in mitigating insider threats is to develop a strong, comprehensive plan for responding to incidents. The goal of response is to ensure swift follow-up with the most appropriate actions by the security team.

Effective response requires linking data generated by access and other systems to individuals’ actions, which must be actively monitored and audited to generate real-time awareness of emerging threats. There are automated solutions that monitor and audit these systems for anomalies and correlate them with other data.

Once data has been reviewed, raising the issue of atypical access patterns with an employee can be sensitive. After someone attempts to access an unauthorized area, security might send an email asking the employee if they need access to that area. Proactively de-escalating the situation helps prevent honest employees from feeling attacked. For those who may be planning or considering insider theft or other action, it is a warning.

For handling the worst-case scenario where an insider breach has already occurred, organizations must develop a comprehensive employee termination procedure that includes deactivating credentials to remove access privileges immediately. Simply knowing insider threat is a problem is not enough without concrete policies and procedures in place to mitigate or avoid these types of breaches. By implementing best practices to ensure effective prevention, detection and response, organizations can ensure not only that they are actively working to prevent these threats, but also that employees are willing to become an extension of the security team, helping to prevent potentially devastating consequences.

This article originally appeared in the January 2017 issue of Security Today.


  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity


New Products

  • ResponderLink


    Shooter Detection Systems (SDS), an company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3