Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Addressing Cybersecurity and the Insider Threat

By Claire Meyer
Enemy inside the gate
After 35 years working in the public sector, Douglas Thomas built up the Counterintelligence Operations department at Lockheed Martin

After 35 years working in the public sector, Douglas Thomas built up the Counterintelligence Operations department at Lockheed Martin, where he works to investigate insider threats – from malicious insiders, competitors or nation-states, as well as risks from unaware employees. Photo courtesy of Lockheed Martin

At social networking company Pinterest, security engineering lead Paul Moreno strives to build a granular picture of typical and atypical behaviors of employees

 At social networking company Pinterest, security engineering lead Paul Moreno strives to build a granular picture of typical and atypical behaviors of employees accessing the enterprise’s network to better detect anomalies and insider threats. Photos courtesy of Pinterest 

Kate Borten of The Marblehead Group and the Visual Privacy Advisory Council.

 “As more employees are using mobile devices or working remotely, the risks of visual hacking and inadvertent data loss will get worse. It’s imperative to change the culture now to avoid the risk of visual privacy breaches,” says Kate Borten of The Marblehead Group and the Visual Privacy Advisory Council. Photo courtesy of Kate Borten 

Enemy inside the gate
After 35 years working in the public sector, Douglas Thomas built up the Counterintelligence Operations department at Lockheed Martin
At social networking company Pinterest, security engineering lead Paul Moreno strives to build a granular picture of typical and atypical behaviors of employees
Kate Borten of The Marblehead Group and the Visual Privacy Advisory Council.
August 1, 2015

In the wake of massive data breaches such as those at the U.S. government’s Office of Personnel Management, health insurer Anthem and retailer Target, an enterprise’s initial reaction might be to tighten the security around networks and data. However, you may be forgetting one critical component: the insider threat.

According to a June SpectorSoft report, 62 percent of security professionals polled said insider incidents are up at their organizations, and privileged users are often the prime suspect. The report also found that security professionals could not determine if the enterprise had suffered more attacks or not. Of those who could, the average number of incidents was 3.8 per enterprise. The top insider threats identified were data leaks (63 percent), inadvertent data breaches (57 percent) and malicious data breaches (53 percent).

As enterprises work to lock down their networks, malicious actors will work to find the next best way in – your employees.

This does not mean that all employees are hackers or saboteurs in the making, however. But inadvertent data breaches, such as employees clicking on unsafe links, not adhering to password security requirements or accidentally forwarding a sensitive document, can cause similar damage. According to a June Trustwave report, half of the point-of-sale breaches across 15 countries in 2014 were the result of weak passwords. Also, an outsider can conduct an attack by stealing or manipulating a privileged insider’s credentials to get more access. These actions count as insider threats, both at international enterprises and small businesses alike.

“If you’re a company, and you’re making money, you’re a target,” says Douglas Thomas, Director of Counterintelligence Operations and Corporate Investigations for Lockheed Martin, adding that while a large enterprise might be able to survive the consequences of a major cyberattack or breach, a small or midsized business is much more likely to go bankrupt.

 

Abuse of Privilege

Credential escalation and credential theft by outsiders is one of the main concerns for Paul Calatayud, the CISO for health information network company Surescripts, which manages health transaction information (patient records, electronic prescriptions) for 900,000 providers, 60,000 pharmacies and 3,000 hospitals.

“Say ‘insider threat,’ and a lot of people automatically think an employee with a will to harm the company, but it could be a nation-state, an external actor… their ability to imitate your employees’ privileges changes the game,” Calatayud says.

“At its root, an insider threat is an abuse of privilege,” he adds. “Recent breaches have shown external actors’ success in obtaining administrative account information, which then lets them create subsequent accounts that they can access and manipulate. Account creation is a threat indicator for us – we watch for new domain administrator profiles, and use network and technology solutions to detect deviations from existing users’ patterns to find anomalies.” For example, if an HR administrator were to create a privileged account at 2 a.m. with no new hires, this would be a bright red flag.

Working with risk management platform LockPath, it takes Surescripts about six months to get an adequate baseline of normal activity on its network, and about three months to get an accurate picture of a user’s patterns and behavior. Depending on the level of sensitivity a user deals with regularly, Calatayud says, you could add more in-depth Big Data gathering, such as click analytics and typing patterns to further detect unusual behavior.

“This Big Data helps us watch for fraud, even for our customers, such as a doctor writing an unusual volume of prescriptions,” he says. “By getting visibility into our data use at a granular level, it helps us make risk-based business decisions, and gather metrics to support those decisions.”

At social networking site Pinterest, bringing some visibility into the unknown is the goal for Security Engineering Lead Paul Moreno’s team. Pinterest combines machine learning and some internal tools to build a baseline of departments’ general activity and get a granular picture of atypical behaviors (such as accessing international sites) that might actually fall within that department’s purview. This helps to squash irrelevant alerts and false alarms. Moreno is using Vectra Networks’ cloud-based analysis program as an additional headcount for his department; the tool helps to filter out some of the noise of false alarms.

 

Well Informed, Well Prepared

Gaining insight into internal behavior is helpful, but not the end-all of presenting insider threat and other network risks to the C-Suite, of course.

“Never waste a good incident,” Moreno says. “The Heartbleed vulnerability was a game changer at Pinterest, because almost everything is SaaS (Software as a Service) or cloud-based here.” By using the momentum of interest over the Heartbleed Bug, Moreno was able to get employees to adopt and adhere to an incident response plan, which includes a hefty discovery process. “You have to know your attack surface, as well as your third-party vendors’ activities and patching habits. We documented this along the way, so it’s sharable to company leadership, and we can show the data driving our decision-making.”

Mike Belloise, Director of Information Security at healthcare benefits and payroll transaction company TriNet, is also a believer in not wasting bad news. “It takes very, very little to cause a terrible incident at a company of any size. High-profile data breaches such as those of Target, Home Depot and even the federal government make headline news and serve as a gut-check for security professionals. We have to ask ‘Do we have that covered?’ and learn from these scenarios. C-level leaders read these headlines, so we have to be prepared to answer their questions about our own defenses.”

Belloise keeps his department agile by using metadata like an SIEM (security information and event management) tool. Because TriNet deals with sensitive data and must contend with compliance regulations, there are filters on sensitive content sending, so the system will automatically detect and block records from being sent outside the appropriate departments or privilege levels.

TriNet also works with SecurityScorecard to evaluate third-party vendors and tools to understand their security postures and monitor specific threat indicators to keep Belloise informed about potential weaknesses. One major weak link that all enterprises cannot avoid, however, is employees.

“The IT security industry has seen a recent upswing in email phishing scams to get into an organization’s network,” says Belloise. “Education is paramount to information security. We work to educate our employees and the C-Suite with awareness training, in-house phishing testing and annual education modules. ... We’re getting even more interaction from the company, and even more suspicious emails or other issues reported to our teams, which is an indicator our security awareness training is working.”

At French biometrics and access management company Safran Morpho, employees at every level undergo two to three mandatory annual training sessions to gain more security awareness. According to Vice President of Digital Security and Authentication Laurent Porracchia, “Once an employee clicks on an infected document, it’s too late. We want to train our employees to call the help desk as soon as they have doubts about an email, not after. Malware now can steal information without leaving any major trail, and we need to protect our intellectual property and our databases.

“If we want to keep our leading place in the market, we have to keep our secrets,” Porracchia adds. “So we have to know what is really sensitive data and what isn’t.” Safran Morpho is using email classification tool TITUS to rank every document and asset in the company, and it automatically adds security measures to more sensitive documents. For a classified report, for example, only a small group with network privileges can access it, and the policies in place prevent them from forwarding those documents, copying them onto USB drives or printing them.

 

The Heartbeat of Cybersecurity

In the summer of 2011, the Lockheed Martin CSO sent out a survey to employees about their personal knowledge of threats from nation states and competitors. About 38 percent felt they had some knowledge of their risks. After the implementation of Douglas Thomas’s Counterintelligence division and the subsequent awareness campaign, 82 percent of employees polled in summer 2014 felt they had a good understanding of threats and what to do if they are suspicious.

“There is a shifting threat landscape, and nation states and hackers are targeting corporate America more than the U.S. government,” Thomas says. “Employees themselves are targets for their access privileges, and we needed to get the message out.” The division leverages existing processes to distribute consistent messages. As all Lockheed Martin employees are required to take annual ethics training and obligation to protect intellectual property training classes, each class features a small counterintelligence section. The company’s 65,000 clearance holders also have annual training sessions on protecting classified information, and a small video is included from Thomas’s team.

“We want to encourage a culture of engagement, not ‘snitching,’” Thomas says. “We emphasize the indicators of unusual behavior.”

For example, if the quality of a Lockheed Martin employee’s work suddenly falls a few pegs, or they begin asking for access to unauthorized information, they might be adjusting to a new position or working on a new project, but it’s worth looking into, Thomas says.

“We are going to see more human-enabled cyberattacks as networks get hardened,” he says. “We have to look for the heartbeat (human behavior) along with network activity. The data that our network tools analyze is all objective. We have to assign parameters to that data to get alerts – subjective analysis.”

At the Law Offices of Joe Bornstein, based in Maine, IT manager Chris Berube uses insight from data storage analysis tool DataGravity to determine whether information is in the correct place on the network (company credit card information stays with the finance department and not HR, for example) and to investigate which files an attorney has accessed before they leave the firm.

“The Anthem breach hit home for just about everyone,” says Berube. “The next tier of targets will include industries that deal with both finance and healthcare on a regular basis, so we need to prepare and educate our employees and partners about email encryption and other security measures. If stolen, our data could be used to impersonate clients, so we’re striving to be HIPAA-compliance in our office.”

By analyzing the Big Data that these tools can collect, enterprise security leaders can gather internal metrics for the C-Suite, both on discovered (or prevented) insider threats and exonerations.

 

Visual Vigilance

Sometimes, however, this requires a culture shift. Just as an insider threat might stem as easily from a careless employee’s email as a nation-state’s corporate spy, so might an insider breach occur from an ill-placed computer screen.

According to Kate Borten of consulting firm The Marblehead Group and the Visual Privacy Advisory Council, careless placement of computer screens, documents or other sensitive materials could result in a visual hacking incident. This includes mobile workers who bring their laptops and documents to the local café, or who are reading up on different documents, patient files or intellectual property information in airports, on trains or other public places. One of the most obvious places for potential visual hacking is healthcare establishments.

“The HIPAA security rule applies only to electronic data, so many organizational security programs in healthcare and other industries are often based in IT and focus on technology,” says Borten. “So you can presume that the technology is implemented on the back end, but sometimes information isn’t being protected on the front end, such as when it is printed or shown on a screen. You have to consider who can see the information where it is displayed to colleagues, other employees, the public… This has the potential to be a HIPAA data breach. Just looking over someone’s shoulder, you might not be able to see large amounts of data, but it still counts as an unauthorized disclosure, a confidentiality breach. That breach could have a life-altering impact on the individual, and it’s incredibly difficult to track and investigate.”

According to a Ponemon Institute study, sponsored jointly by 3M Company and the Visual Privacy Advisory Council, in 88 percent of instances, a white hat hacker was able to visually hack corporate information including employee access and login credentials, confidential and classified documents, financial or budget information, or attorney-client privilege documents. Fifty-three percent of the information gleaned during the penetration test was deemed sensitive.

Borten recommends that security leaders take confidentiality challenges into their own hands and walk around the facility and observe: are there sensitive documents or patient information on counters, in the trash, or waiting on the printer? Can you see computer screens from hallways and corridors? Can you take documents with you outside the enterprise, either on paper or on devices?

“This problem requires a culture change,” she says. “We need strong role models to advocate for privacy controls, including turning computers away from common spaces, adding privacy screens or filters, and getting the C-Suite on board. A visual hacking incident could count under HIPAA violations as willful neglect, and it could easily get into the news.

“People are not often as aware as they should be,” Borten adds.

Keeping up to date with cybersecurity news, insider threat analysis and different attack patterns requires continuous vigilance on the network, as well as employee monitoring and education.

KEYWORDS: data theft insider threats network security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Claire Meyer is a former Managing Editor for Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • insider-enews

    True Data Privacy Cannot Exist Without Addressing the Insider Threat

    See More
  • Security leader cybersecurity leader boardroom strategies

    Addressing insider threats: in the boardroom

    See More
  • bigglass insider threats more than 70% of companies have an insider cyber attack

    Insider threat report: 61% of companies have had an insider attack in the past year

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products
×
After 35 years working in the public sector, Douglas Thomas built up the Counterintelligence Operations department at Lockheed Martin, where he works to investigate insider threats – from malicious insiders, competitors or nation-states, as well as risks from unaware employees. Photo courtesy of Lockheed Martin
 At social networking company Pinterest, security engineering lead Paul Moreno strives to build a granular picture of typical and atypical behaviors of employees accessing the enterprise’s network to better detect anomalies and insider threats. Photos courtesy of Pinterest 
 “As more employees are using mobile devices or working remotely, the risks of visual hacking and inadvertent data loss will get worse. It’s imperative to change the culture now to avoid the risk of visual privacy breaches,” says Kate Borten of The Marblehead Group and the Visual Privacy Advisory Council. Photo courtesy of Kate Borten 

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!