Government Computer News: Limiting the Insider Threat

Thanks to efforts from the Department of Homeland Security’s Computer Emergency Readiness Team, today’s cyber intelligence is more robust than ever. Among private-sector security professionals, the CERT team is considered a leading source of information regarding cyber threats and defense strategies. However, despite CERT leading the charge on cyber security, many federal agencies are lagging behind when it comes to protecting their assets.

Government Computer News: Limiting the Insider Threat

This is not merely a matter of opinion. In September 2017 the Government Accountability Office conducted an in-depth study of federal agencies and found persistent weaknesses in cyber security practices. This is despite the security innovations of the last decade. Agencies’ struggles with cyber security places the United States at risk. The significant areas of risk GAO found included the following:

Weak access controls. Digital or physical access controls prevent unauthorized access to data or other sensitive resources and include boundary protection, user ID/authentication, authorization, encryption, log audits/monitoring and physical security. According to GAO, 24 federal agencies had glaring weaknesses in these at least one of these areas. and 516 access control weaknesses were identified. Continue reading on GCN.

Isaac Kohen

Isaac Kohen

Isaac Kohen started out in quantitative finance by programming trading algorithms at a major hedge fund. His time spent in the financial world and exposure to highly sensitive information triggered his curiosity for IT security. He worked as an IT security consultant for several years where he spearheaded efforts to secure the IT infrastructure of companies with masses of confidential data. When Isaac first entered the industry, IT norms were to prohibit and lock out as many people as possible to protect data. He found that this was a very ineffective way of solving the issue because it made it hard for many people who wanted to cause no harm, to do their jobs. He decided to focus on algorithms targeting user behavior to find outliers within the companies he consulted with to help detect insider threats. Isaac can be contacted at ikohen@teramind.co

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *