|Targeted News Service|
Today's world is more interconnected than ever before. Yet, for all its advantages, increased connectivity brings increased risk of theft, fraud and abuse. As we become more reliant on technology, we also become more vulnerable to cyber attacks such as insider threats, spear phishing and security breaches. Industry and government are working together to combat these threats, and on
The panel was moderated by
The panel discussed changes in agency cyber monitoring and reporting approaches as a result of the most recent high profile insider threat cases involving Pvt.
According to Schneider, "Securing our data is a prerequisite for sharing our data. If we can't assure other agencies that we will secure their data, whether from insider threat or other, we will never get access to their data."
The panel members agreed that combating these threats requires a risk management approach to everything from security clearance vetting to implementing new tools and controls. Policy often can't keep up with technology and can potentially hinder success if not implemented or updated. According to Buckley, we have to implement more than perimeter security, "We must get human resource and physical security personnel involved in helping to look for indicators of insider threat risk."
TNS 30FurigayJane-140718-4800677 30FurigayJane
|Copyright:||(c) 2014 Targeted News Service|