Pathfynder
  • Home
  • Cyber Solutions
    • Risk Assessments
    • Threat Hunting
    • Insider Threat
    • Offensive Security
    • vCISO
  • Our Company
    • The Team
    • Careers
  • Blog
  • Contact

The Guide

MATURING A FORTUNE 50 INSIDER THREAT PROGRAM

9/15/2020

0 Comments

 
Picture
Globally, over one-third of businesses are impacted by insider threats every year, with organizations experiencing a 47% increase in insider incidents since 2018.

Regardless of whether these incidents are malicious or accidental, the ease of access to critical information possessed by insiders and difficulty identifying, tracking, and quantifying their damage makes this a critical risk that organizations must address.
​
Pathfynder is at the forefront of establishing and maturing insider threat programs for global organizations. The following case study covers an insider threat engagement with a Fortune 50 company.
THE PROBLEM

A Fortune 50 company with sensitive intellectual property needed to mature its highly manual insider threat program to effectively mitigate the risk posed by its employees, contractors, and other third-party resources.
 PATHFYNDER’S SOLUTION

Pathfynder’s insider threat solution distills highly manual processes into automated playbooks designed, tested, and implemented by experts with over 20 years of experience. At the start of this engagement, we provided a foundational batch of playbooks which were tailored to operate within this Fortune 50’s environment.

These playbooks combed two critical components to automate threat identification which empowered this Fortune 50’s analysts to operate more effectively:
​
  • Insider threat analytics: algorithms that combine traditional threat hunting techniques of file hash detection, known malicious IP addresses, and domains with file accesses, email communications, and logon activity
  • ​Threat personas: algorithms that identify potential insiders based on employee characteristics (e.g., employee or contractor departing the organization within a specific time frame)

We eventually focused our playbooks on two primary threat personas: flight risks (employees on the verge of resigning) and terminated employees. Flight risks were identified by monitoring activities associated with job sites or communications with competitors. For terminated employees, Human Resources alerted the insider threat team of an upcoming action, which enabled a review of the subjects’ activity over the past 30 days up until the date of separation.

Converting what once were highly manual processes into automated playbooks tailored to this organization was an iterative and deliberate process between Pathfynder and the security team. This investment had an immediate positive impact on this Fortune 50, significantly maturing their insider threat program and establishing it as a critical component of their defensive strategy.

THE RESULT
​
  • Increased insider threat investigation cycle output by 400% through automation of manual processes — reducing to minutes what used to take analysts hours or days to complete.
  • Established an insider threat knowledge base that institutionalizes expertise from countless security team members that can be expanded and refined over time.
Picture
ARTIE THREAT: PATHFYNDER’S ANSWER TO THE INSIDER THREAT
​

Our tech-enabled insider threat solution aims to mature this critical program to maximize your investment in it. We work with company leaders to identify the personas most likely to be insider threats (e.g. privileged IT user, contractor, regular employee). Armed with that information, we configure analytics tools with our proprietary algorithms to detect anomalous behavior.
These algorithms alert insider threat investigators to potential malicious activities they can track and mitigate. Program managers and company leadership receive reports with detailed findings, arming executives with critical information to make informed decisions on how best to proceed.
HOW WE GOT THERE: THE POWER OF PLAYBOOKS

Playbooks are designed to identify potential insider threats and support investigations through the collection and analysis of the insider’s behaviors. Playbooks greatly enhanced this Fortune 50’s security analyst capabilities and made their process more efficient as foundational playbooks were refined and additional playbooks added.
​
Below is a summary of how we advanced this Fortune 50’s insider threat program from a largely manual process to a primarily automated one:
Insider Threat Playbook
INTERESTED IN READING MORE ABOUT PATHFYNDER'S APPROACH TO INSIDER THREATS?
  • ​Blog. Greek Traitors and Russian Hackers: A Vignette on Insider Threats
  • Solution. Artie Threat: A Tech-Driven Approach to Tackle the Insider Threat
Pathfynder is a service-disabled veteran-owned small business with offices in Washington, D.C. and Bozeman, MT. Shaped by decades of US military and intelligence community experience, we provide cybersecurity expertise and solutions trusted by small and medium-sized businesses as well as Fortune 50 companies.
CONTACT US
0 Comments



Leave a Reply.

    Archives

    December 2020
    September 2020
    August 2020
    July 2020
    May 2020
    April 2020

    Categories

    All
    Active Adversary
    BOLO
    Case Study
    Cyber Threat
    Emerging Threat
    Industrial Manufacturing
    Insider Threat
    Logistics
    Malware
    Offensive Cyber
    Penetration Tests
    Phishing
    Ransomware
    Risk Assessments
    Shipping
    Spoofing
    Threat Hunting
    Threat Intelligence
    Work From Home

    RSS Feed

Contact
Privacy Policy
Logo & Mark
EULA
Blog
Pathfynder 2020 | All Rights Reserved
  • Home
  • Cyber Solutions
    • Risk Assessments
    • Threat Hunting
    • Insider Threat
    • Offensive Security
    • vCISO
  • Our Company
    • The Team
    • Careers
  • Blog
  • Contact