AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Internal risk management in cybersecurity: a complex challenge

Advanced protection strategies to counter insider threats in cybersecurity

The article highlights the importance of managing internal risk in cybersecurity. It is highlighted that cyber attacks often involve internal components, such as employees. The difference between "internal risk" and "internal threat" and the importance of adopting a multi-layered defense strategy are highlighted.

This pill is also available in Italian language

In managing internal risk in cybersecurity, there are often underestimated but crucial aspects. According to Federico Charosky, CEO of Quorum Cyber, it is essential to clearly define the concepts related to internal risk, discriminating between malicious and involuntary internal threats. This distinction, anything but a semantic subtlety, is fundamental to understanding the nature of the problem and finding adequate solutions.

The nuances of insider threats in cybersecurity

Charosky refers to a Microsoft report that highlights that approximately 85% of cyber attacks involve an internal component. This data confirms the crucial role of employees in facilitating an attack, both knowingly and unknowingly. Identity compromise is one of the key elements, whether through manipulation of the identity of insiders or through coercion or deception.

The difference between "internal risk" and "internal threat"

It is important to distinguish between "insider risk" and "insider threat", terms that are often confused. While an insider risk indicates a potential vulnerability (such as an employee with excessive access privileges), an insider threat indicates malicious actions carried out by an individual. This distinction allows us to adopt more targeted defense strategies and deal with internal threats more effectively.

The need for a multi-layered defense

Charosky emphasizes the importance of a multi-layered defense strategy. Relying solely on employee awareness and action is ineffective. An organization's IT security must involve all hierarchical levels and include adequate security measures. From aligning IAM protocols to adopting Zero Trust models, from implementing secure email gateways to ongoing employee training, a comprehensive, multi-layered approach is critical to effectively mitigate internal risks.

Follow us on Facebook for more pills like this

09/05/2023 16:35

Editorial AI

Last pills

Serious vulnerability discovered in Rabbit R1: all user data at riskVulnerability in Rabbit R1 exposes sensitive API keys. What are the privacy risks?

Cyber attack in Indonesia: the new Brain Cipher ransomware brings services to their kneesNew ransomware hits Indonesia: learn how Brain Cipher crippled essential services and the techniques used by hackers

Patelco Credit Union: security incident halts customer services in CaliforniaService disruption and customer frustration: Patelco Credit Union works to resolve security incident

Cyber attack on TeamViewer: immediate response and investigations underwayStrengthened security measures and international collaborations to counter the cyber threat