SlideShare a Scribd company logo
1 of 15
4 Ways to Defend Against Internal
Attacks
2
Defend Within
GlobalAccountant.com
posted that 1/3 of British
accountants breach their
company IT policies.
Over 40% knew about the
policy and yet ignored it.
If 1/3 of your staff is
breaching your IT policy,
what can you do to defend
within?
3
1. Role Based Access
Challenge:
You have hundreds,
even thousands of
users in your system.
How can you provision
everyone with the
correct access in a
timely fashion?
Answer:
Role Based Access
where you are given
permission based on
your role in the
company but can still
request access to
other programs.
4
What is Role Based Access?
This is Joe, a new
developer starting today.
When Joe goes to
request access how does
he know which of the
company’s applications
to choose?
???
5
What is Role Based Access?
With Role Based Access,
Joe will be led to the most
relevant applications for his
role taking the guess work
out and preventing requests
for excessive access or for
programs they don’t need.
6
Why Role Based Access?
Approver saves time by only approving requests outside of
the users role. This limits the rubber stamping effect and
gives better visibility into what is being approved.
User saves time by having his applications
suggested for him rather than having to guess what
he needs and possibly request access to critical
systems he doesn’t.
Company saves time and money with tighter security and
fewer user accounts with privileged access.
7
2. Access Management
What three roles does
every organization
have in common?
1. Joiners
2. Movers
3. Leavers
8
Access Management
Joiners and Movers
need to have access
granted as soon as
possible to enable
them to do their jobs.
Leavers pose the
largest threat to your
system and need to
have access shut off
immediately.
“1 in 5 employees still have
access to internal systems at
their previous jobs” –
SCMagazine.com
9
3. Segregation of Duties
Who wouldn’t love to
set and approve their
own budget?
What about submit
and approve your own
purchase order?
10
Segregation of Duties
In order to uphold
checks and balances
you need segregation
of duties.
This will set
permissions for your
team and put up
barriers to critical
risks.
11
4. Real-Time Monitoring
Auditing is everyone’s
least favorite time of
the year.
However, if you only
audit once a year then
you only see into your
system once a year.
What happens the
other 11 months?
12
Real-Time Monitoring
Question:
If you had 4 new
accounts come online
in one week, all with
privileged access,
would you notice?
13
Real-Time Monitoring
With real-time
monitoring capabilities
in an intelligent IAM
system your system is
continuously
monitored and you are
alerted when things
look wrong.
14
5. Build a Security Aware Culture
I know, I said 4 ways so this
one is free.
By building a culture that is
aware of the risks to themselves
and the company, you expand
your security team
exponentially.
When your organization buys in
to your security strategy they
become more aware of risks,
take more precautions against
them and become a new line of
defense against attacks.
15
Are You Ready to Defend Within?
Are you currently monitoring these 4 breach risks?
Have you experienced one of these breaches?
Do you know what risks are currently in your system?
Let Courion help.
With a Quick Scan of your systems, we can show you
where your critical risks lie and how to secure them.
Get My Quick Scan>>

More Related Content

What's hot

Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesSlideTeam
 
Scug 1809 Take conditional access to the next level
Scug 1809   Take conditional access to the next levelScug 1809   Take conditional access to the next level
Scug 1809 Take conditional access to the next levelPer Larsen
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security TestingAlan Kan
 
Ewug 1808 take conditional access to the next level
Ewug 1808   take conditional access to the next levelEwug 1808   take conditional access to the next level
Ewug 1808 take conditional access to the next levelPer Larsen
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistCigital
 
Any of these folks work with you?
Any of these folks work with you?Any of these folks work with you?
Any of these folks work with you?Kevin O'Connor
 
Security by the numbers
Security by the numbersSecurity by the numbers
Security by the numbersEoin Keary
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Enterprise Management Associates
 
Iasi code camp 12 october 2013 ana tudosa - challenges in implementing and ...
Iasi code camp 12 october 2013   ana tudosa - challenges in implementing and ...Iasi code camp 12 october 2013   ana tudosa - challenges in implementing and ...
Iasi code camp 12 october 2013 ana tudosa - challenges in implementing and ...Codecamp Romania
 
Secure Code Warrior - Client side injection
Secure Code Warrior - Client side injectionSecure Code Warrior - Client side injection
Secure Code Warrior - Client side injectionSecure Code Warrior
 
Secure Code Warrior - Security decisions via untrusted inputs
Secure Code Warrior - Security decisions via untrusted inputsSecure Code Warrior - Security decisions via untrusted inputs
Secure Code Warrior - Security decisions via untrusted inputsSecure Code Warrior
 
Ahearn Security Presentation
Ahearn Security PresentationAhearn Security Presentation
Ahearn Security Presentationjohnjamesahearn
 
Secure Code Warrior - Poor authorization and authentication
Secure Code Warrior - Poor authorization and authenticationSecure Code Warrior - Poor authorization and authentication
Secure Code Warrior - Poor authorization and authenticationSecure Code Warrior
 

What's hot (19)

Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
 
Scug 1809 Take conditional access to the next level
Scug 1809   Take conditional access to the next levelScug 1809   Take conditional access to the next level
Scug 1809 Take conditional access to the next level
 
Owasp Top 10
Owasp Top 10Owasp Top 10
Owasp Top 10
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
 
Ewug 1808 take conditional access to the next level
Ewug 1808   take conditional access to the next levelEwug 1808   take conditional access to the next level
Ewug 1808 take conditional access to the next level
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing Checklist
 
OWASP TOP 10 & .NET
OWASP TOP 10 & .NETOWASP TOP 10 & .NET
OWASP TOP 10 & .NET
 
Any of these folks work with you?
Any of these folks work with you?Any of these folks work with you?
Any of these folks work with you?
 
Security by the numbers
Security by the numbersSecurity by the numbers
Security by the numbers
 
Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...
 
Iasi code camp 12 october 2013 ana tudosa - challenges in implementing and ...
Iasi code camp 12 october 2013   ana tudosa - challenges in implementing and ...Iasi code camp 12 october 2013   ana tudosa - challenges in implementing and ...
Iasi code camp 12 october 2013 ana tudosa - challenges in implementing and ...
 
Secure Code Warrior - Client side injection
Secure Code Warrior - Client side injectionSecure Code Warrior - Client side injection
Secure Code Warrior - Client side injection
 
Secure Code Warrior - Security decisions via untrusted inputs
Secure Code Warrior - Security decisions via untrusted inputsSecure Code Warrior - Security decisions via untrusted inputs
Secure Code Warrior - Security decisions via untrusted inputs
 
Security testing
Security testingSecurity testing
Security testing
 
Ahearn Security Presentation
Ahearn Security PresentationAhearn Security Presentation
Ahearn Security Presentation
 
Owasp Top 10-2013
Owasp Top 10-2013Owasp Top 10-2013
Owasp Top 10-2013
 
Owasp Top 10
Owasp Top 10Owasp Top 10
Owasp Top 10
 
Secure Code Warrior - Poor authorization and authentication
Secure Code Warrior - Poor authorization and authenticationSecure Code Warrior - Poor authorization and authentication
Secure Code Warrior - Poor authorization and authentication
 

Similar to 4 Ways to Defend Against Internal Attacks

5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business AccountsAnayaGrewal
 
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWFREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWinfosec train
 
Course Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemCourse Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemTheodore Le
 
Online compliant response system for corporation
Online compliant response system for corporationOnline compliant response system for corporation
Online compliant response system for corporationDhavamani Prakash
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingTory Quinton
 
Edge wave 6 Important Steps to Evaluating a Web Filtering Solution
Edge wave 6 Important Steps to Evaluating a Web Filtering SolutionEdge wave 6 Important Steps to Evaluating a Web Filtering Solution
Edge wave 6 Important Steps to Evaluating a Web Filtering SolutionCMR WORLD TECH
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!Caroline Johnson
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)Asif Iqbal
 
Footprintig (Haching)
Footprintig (Haching)Footprintig (Haching)
Footprintig (Haching)Asif Iqbal
 
The Ultimate Workflow Management Software Buyers Guide 2023
The Ultimate Workflow Management Software Buyers Guide 2023The Ultimate Workflow Management Software Buyers Guide 2023
The Ultimate Workflow Management Software Buyers Guide 2023Kashish Trivedi
 
Cloud Compliance Use Case Demo
Cloud Compliance Use Case DemoCloud Compliance Use Case Demo
Cloud Compliance Use Case Demoforkish
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
7 IAM Best Practices to Secure Your Enterprise
7 IAM Best Practices to Secure Your Enterprise7 IAM Best Practices to Secure Your Enterprise
7 IAM Best Practices to Secure Your EnterpriseVinod K
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughFraudBusters
 
Enterprise data security and chatbots: What IT teams need to know
Enterprise data security and chatbots: What IT teams need to knowEnterprise data security and chatbots: What IT teams need to know
Enterprise data security and chatbots: What IT teams need to knowTalla
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 

Similar to 4 Ways to Defend Against Internal Attacks (20)

5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts
 
CISA (1).pdf
CISA (1).pdfCISA (1).pdf
CISA (1).pdf
 
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWFREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
 
Course Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemCourse Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information System
 
main project doument
main project doumentmain project doument
main project doument
 
Online compliant response system for corporation
Online compliant response system for corporationOnline compliant response system for corporation
Online compliant response system for corporation
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
 
Edge wave 6 Important Steps to Evaluating a Web Filtering Solution
Edge wave 6 Important Steps to Evaluating a Web Filtering SolutionEdge wave 6 Important Steps to Evaluating a Web Filtering Solution
Edge wave 6 Important Steps to Evaluating a Web Filtering Solution
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
 
Footprintig (Haching)
Footprintig (Haching)Footprintig (Haching)
Footprintig (Haching)
 
The Ultimate Workflow Management Software Buyers Guide 2023
The Ultimate Workflow Management Software Buyers Guide 2023The Ultimate Workflow Management Software Buyers Guide 2023
The Ultimate Workflow Management Software Buyers Guide 2023
 
Cloud Compliance Use Case Demo
Cloud Compliance Use Case DemoCloud Compliance Use Case Demo
Cloud Compliance Use Case Demo
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Example_Whitepaper
Example_WhitepaperExample_Whitepaper
Example_Whitepaper
 
7 IAM Best Practices to Secure Your Enterprise
7 IAM Best Practices to Secure Your Enterprise7 IAM Best Practices to Secure Your Enterprise
7 IAM Best Practices to Secure Your Enterprise
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
 
Enterprise data security and chatbots: What IT teams need to know
Enterprise data security and chatbots: What IT teams need to knowEnterprise data security and chatbots: What IT teams need to know
Enterprise data security and chatbots: What IT teams need to know
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 

Recently uploaded

Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingSelcen Ozturkcan
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

4 Ways to Defend Against Internal Attacks

  • 1. 4 Ways to Defend Against Internal Attacks
  • 2. 2 Defend Within GlobalAccountant.com posted that 1/3 of British accountants breach their company IT policies. Over 40% knew about the policy and yet ignored it. If 1/3 of your staff is breaching your IT policy, what can you do to defend within?
  • 3. 3 1. Role Based Access Challenge: You have hundreds, even thousands of users in your system. How can you provision everyone with the correct access in a timely fashion? Answer: Role Based Access where you are given permission based on your role in the company but can still request access to other programs.
  • 4. 4 What is Role Based Access? This is Joe, a new developer starting today. When Joe goes to request access how does he know which of the company’s applications to choose? ???
  • 5. 5 What is Role Based Access? With Role Based Access, Joe will be led to the most relevant applications for his role taking the guess work out and preventing requests for excessive access or for programs they don’t need.
  • 6. 6 Why Role Based Access? Approver saves time by only approving requests outside of the users role. This limits the rubber stamping effect and gives better visibility into what is being approved. User saves time by having his applications suggested for him rather than having to guess what he needs and possibly request access to critical systems he doesn’t. Company saves time and money with tighter security and fewer user accounts with privileged access.
  • 7. 7 2. Access Management What three roles does every organization have in common? 1. Joiners 2. Movers 3. Leavers
  • 8. 8 Access Management Joiners and Movers need to have access granted as soon as possible to enable them to do their jobs. Leavers pose the largest threat to your system and need to have access shut off immediately. “1 in 5 employees still have access to internal systems at their previous jobs” – SCMagazine.com
  • 9. 9 3. Segregation of Duties Who wouldn’t love to set and approve their own budget? What about submit and approve your own purchase order?
  • 10. 10 Segregation of Duties In order to uphold checks and balances you need segregation of duties. This will set permissions for your team and put up barriers to critical risks.
  • 11. 11 4. Real-Time Monitoring Auditing is everyone’s least favorite time of the year. However, if you only audit once a year then you only see into your system once a year. What happens the other 11 months?
  • 12. 12 Real-Time Monitoring Question: If you had 4 new accounts come online in one week, all with privileged access, would you notice?
  • 13. 13 Real-Time Monitoring With real-time monitoring capabilities in an intelligent IAM system your system is continuously monitored and you are alerted when things look wrong.
  • 14. 14 5. Build a Security Aware Culture I know, I said 4 ways so this one is free. By building a culture that is aware of the risks to themselves and the company, you expand your security team exponentially. When your organization buys in to your security strategy they become more aware of risks, take more precautions against them and become a new line of defense against attacks.
  • 15. 15 Are You Ready to Defend Within? Are you currently monitoring these 4 breach risks? Have you experienced one of these breaches? Do you know what risks are currently in your system? Let Courion help. With a Quick Scan of your systems, we can show you where your critical risks lie and how to secure them. Get My Quick Scan>>