Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Insider Threat: How to Properly Govern Identities & Identify Nefarious Actors

By Frank Briguglio
Insider Threat
October 16, 2019

Cybersecurity threats now come in many different forms. From ransomware and malware to phishing — the list of ways into an organization’s sensitive underbelly is growing.

But a few recent breaches of federal, state, local governments and even from a few enterprises, show that the threat landscape is changing. Because these specific breaches were caused by insider threats. The millions of identities and sensitive data that have been compromised over the last few months have caused organizations to halt business operations and it was all due to a bad seed in an organization. In order to get to the bottom of insider threats, let’s look at what it is, how it operates and what to do to stop it in its tracks.

What is an insider threat?

Insider Threat is defined by Carnegie Mellon (CERT) as the potential for an individual who has or had authorized access to an organization's assets to use their access, either maliciously or unintentionally, to act in a way that could negatively affect the organization.

How do insider threats operate?

Insider threat actors take advantage of behaviors, practices and processes that enable them to conduct their malicious activity. Here’s two ways they go about threatening an organization.

First, the entitlement creep. Without proper visibility, organizations are faced with overexposed accounts and entitlement creep. Accounts become overloaded with privileges the longer a user is with an organization without proper controls for roles, policies and risk. These accounts can then be used to move laterally across system boundaries, elevate privileges and gain unauthorized access. Proper controls and processes remove access when lifecycle events occur such as role, job, location or suitability changes or the access is no longer required.

Second, through improper lifecycle management. During the onboarding process, new employees and contractors should be granted access to the systems and data they need for efficiency but not overloaded. Access to systems and data should be granted with a “least privilege” model and additional access should be on an as needed basis. All access should be granted with segregation of duty (SOD), suitability and risk-based policies with an approval and access certification process. On the other hand, when employees and contractors leave their accounts and entitlements should be immediately revoked, removed or disabled. The longer an account remains active with associated privileges the greater chances it may be exploited.

How do we prevent insider attacks?

An identity program is essential to the modern cybersecurity strategy. Prevention and detection of insider threats should be at the top of list in any organization as the insider can represent the most nefarious vulnerability to enterprise systems and data and for the most part mask their actions as usual business tasks.

There needs to be a govern all approach. Having a complete inventory of all users – employees, contractors, partners and processes, and all structured and unstructured data should be the No. 1 priority of organizations . Many security frameworks focus on the privileged user – or only sensitive applications and data. The attack surface is much broader, we need to establish identity context for everyone, everywhere. We need to be constantly verifying the suitability and legitimacy of users and the access they have.

In a nutshell, a identity strategy provides simple and secure access and ensures that it’s the right access efficiently. The strategy should define and govern access rights to minimize risk associated with entitlement creep, orphaned accounts and separation of duty and suitability policies. When properly implemented the solution will provide visibility to – who has access to what, who should have access, and what are they doing with that access? When these three questions are answered, the insider threat becomes a distant memory.

 

KEYWORDS: cyber security cybersecurity insider threats threat mitigation

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Briguglio 9004 1050px1
Frank Briguglio, CISSP, serves at SailPoint as a Public Sector Identity Governance Strategist. Briguglio is a seasoned cybersecurity professional with more than 20 years of experience. He has extensive knowledge of U.S. Government Security and Compliance Standards, and hands on experience in designing, implementing and managing security related solutions.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • New survey reveals insider threats more of a risk than external threat actors amid COVID-19 and race to work remotely

    Cyber risks related to insider threats bigger than external threat actors

    See More
  • Figurines at desks

    How to Take on the Insider Threat to Cybersecurity

    See More
  • How to Reduce the Insider Cyber Threat

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing