The 10 Biggest and Boldest Insider Threat Incidents

Whitepaper

Published September 2021

X

As the workplace quickly evolves, people are working from anywhere and accessing data everywhere. This shift has dramatically increased many organizations’ exposure to cyber risk. Suddenly, CISOs must manage not just external threats, but countless risks from within.

Most organizations spend significant time and resources understanding and mitigating external threats. Unfortunately, few make the same investment in learning about internal threats. As a result, organizations don’t know what insider threats look like—let alone how to combat them.

We explore five key elements within each incident:

  • What happened
  • Who is behind the insider incident—and why
  • Why insider incidents may be intentional, accidental or the result of account compromise
  • How much these incidents cost the organization they hit
  • Lessons learned from each of these examples to ensure you can better protect your organization

Don't forget to Sign In or Sign Up to Download

OR

Sign up
TO DOWNLOAD

You can update your preferences, unsubscribe or delete your account at any time by logging into the site, or via the links at the bottom of any of our emails.

Biting the hand that feeds IT © 1998–2021