Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now.


Recent data from the Ponemon Institute and DTEX found that 53% of companies find it impossible or very difficult to prevent an insider attack when data is being aggregated, a key indicator of intent of an attack.

A breakdown of the primary challenges to mitigating workforce risks. Lack of in house expertise, lack of collaboration, shift to remote work, and lack of budget top the chart at 52%, 50%, 49%, and 48%.

Above: A breakdown of the primary challenges to mitigating workforce risks.

Image Credit: Ponemon Institute and DTEX Systems

The vast majority of security threats follow a pattern or sequence of activity leading up to an attack, and insider threats are no exception. To fully understand any insider incident, visibility into the entire kill chain of an attack is imperative to preventing the exfiltration of critical data.

The report revealed that organizations are missing the early warning signs of insider threats and the desired endgame or intent of the perpetrators. Nearly half of companies find it impossible or very difficult to prevent an insider attack at the two earliest stages of the Insider Threat Kill Chain; reconnaissance and circumvention. And, 53% of companies find it impossible or very difficult to prevent an insider attack at step three of the kill chain when data is being aggregated — a key indicator of intent of an attack.

Further, the report identified that only 32% of companies feel their organizations are very or highly effective in preventing the leakage of sensitive information. The difficulties businesses experience when it comes to detecting and preventing an impending attack in the various stages of the kill chain is a result of very few organizations having effective monitoring controls and practices in place. Fifteen percent of organizations state that no one has ultimate authority and responsibility for controlling and mitigating workforce risks — a shocking figure given today’s complicated threat landscape.

Event

Intelligent Security Summit

Learn the critical role of AI & ML in cybersecurity and industry specific case studies on December 8. Register for your free pass today.

Register Now

Leveraging the insights presented in this report and filling the security gaps identified through these findings, businesses can work to improve their overall security posture.

Coinciding with Insider Threat Awareness Month and in partnership with the Ponemon Institute, DTEX Systems conducted a comprehensive survey of 1,249 IT and IT security professionals in North America, Western Europe and Australia/New Zealand.

Read the full report by the Ponemon Institute and DTEX Systems.

VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.