Apr 26, 2019

Full Visibility and the Insider Threat Kill Chain: Why it is Critical to See Every Stage

6

Here at Dtex and as an industry, we’ve certainly seen a concerted effort to expand what has previously been a laser focus on external threats. The risks associated with those inside of the organization are widely acknowledged, well-documented, and increasingly prioritized. Yet, a formidable challenge remains for many… both when it comes to keeping the bad actors out and ensuring critical, valuable data stays in.

Just last month, we saw headlines made by the former National Security Agency (NSA) contractor responsible for what might be the biggest breach of classified information in US history. Among other highly-sensitive material, investigators discovered top-secret hacking tools – consisting of computer code and instructions on how to use it – in the thousands of pages and dozens of computers and data storage devices seized by the FBI. Another example, seen firsthand, was the recent case of the Chinese National attempting to flee ANZ with customer data exfiltrated from leading financial services provider and Dtex customer, AMP.

THE CHALLENGE: THE ‘SLOW DRAIN’

THE GUIDE: THE INSIDER THREAT KILL CHAIN

THE CRITICAL PIECE: COMPLETE, USER-FOCUSED VISIBILITY

Subscribe today to stay informed and get regular updates from DTEX Systems