Transcript

© Big Sky Associates, Inc.

Setting Up Campagainst insider threats

© Big Sky Associates, Inc.

The Problem

© Big Sky Associates, Inc.

$9 Billion650%

© Big Sky Associates, Inc.

75% inside

outside 25%

© Big Sky Associates, Inc.

34%

© Big Sky Associates, Inc.

© Big Sky Associates, Inc.

many points of failure.

© Big Sky Associates, Inc.

© Big Sky Associates, Inc.

What should we do about it?

© Big Sky Associates, Inc.

Deter

Detect &

Mitigate

Neutralize &

Exploit

© Big Sky Associates, Inc.

© Big Sky Associates, Inc.

© Big Sky Associates, Inc.

Security gets a little easier

© Big Sky Associates, Inc.

That’s interesting, but it doesn’t

sound like a game-changer.

© Big Sky Associates, Inc.

When it gets really cool

© Big Sky Associates, Inc.

Prediction

© Big Sky Associates, Inc.

Info

rmati

on

Risk

Manageable, but daunting

Save a lot of money

I can live with it

Really scary and hard to stop

© Big Sky Associates, Inc.

Security Silos = Detection Failure

Information

Failed authentications

Authentications / Sec

Authorizations / Min

Physical

Door Entries / Min

Location access patterns

Physical security violations / day

Personnel

Performance risk ratings

Background risk score

Credit Rating

© Big Sky Associates, Inc.

Integrated Security = Prediction

Information

Failed authentications

Authentications / Sec

Authorizations / Min

Physical

Door Entries / Min

Location access patterns

Physical security violations / day

Personnel

Performance risk ratings

Background risk score

Credit Rating

© Big Sky Associates, Inc.

Decision Analytics

Strategy

Technique

Technology

Execution

© Big Sky Associates, Inc.

Strategy

Technique

Technology

Execution

© Big Sky Associates, Inc.

Strategy

Technique

Technology

Execution

© Big Sky Associates, Inc.

Strategy

Technique

Technology

Execution

© Big Sky Associates, Inc.

Strategy

Technique

Technology

Execution

© Big Sky Associates, Inc.

© Big Sky Associates, Inc.

Homework

© Big Sky Associates, Inc.

1. Huddle2. Rank your threats

3. Collect Data

© Big Sky Associates, Inc.

© Big Sky Associates, Inc.

To get the details and the notes with the slides, contact me here or email me at jdillard@bigskyassociates.com

top related