How to Combat Insider Threats in 2021

Date: Thursday, January 28th at 11am PST / 2pm EST

Forrester researchers predict that the remote-workforce trend will drive a steep rise in insider threats. The report says insider threats are already responsible for 25 percent of data breaches and in 2021 that percentage is expected to jump to 33 percent. While “regular” insiders may turn malicious for a variety of reasons, 2021 can expect to see threats emerge from unexpected sources.

To start with, attackers will act as deep undercover agents who will enter organizations as trusted employees with the goal of exfiltrating critical information. Organized cells of recruitment infiltrators offering specifically targeted means to dismantle security protocols that an organization has in place to stop insider threats.

Insider threat prevention best practices are continually evolving as the nature of threats evolves. While nothing is ever foolproof, federal agencies such as NIST, National Insider Threat Task Force and other insider threat guidance sources indicate that when properly implemented, an insider threat mitigation strategy can act as a powerful combatant to insider threats. NIST provides a mapping of risk-based security controls which can help organizations create a blueprint for an insider threat program.

Key takeaways include:

  • The rise of synthetic identities in 2021
  • Aligning human behavior to an insider threat using user and entity behavior analytics (UEBA)
  • Developing a data-driven approach to insider threat
  • Creating a policy-driven insider threat mitigation program with Zero Trust

Register now!

About the presenter:

Jay Reddy, IAM & IT Security Expert, ManageEngine

Jay Reddy has been associated with ManageEngine for over 5 years. As a technical evangelist, he helps IT leaders and global enterprises to outmaneuver complex cybersecurity challenges. He is a sought after speaker on the latest IT trends in international conferences and seminars. He has authored numerous e-books and conducted research studies that help business leaders with insight and advice on leveraging the latest technology for better IAM and cybersecurity.


Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.