Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Just Around the Corner

By Kevin Coleman
January 21, 2017

The year 2016 is over and one for the history book. Cybersecurity activity broke records as they did the previous year, and the year before and the year before that. Toward the end of 2016 we saw so many predictions about what 2017 has in store for us, many that offer a wide range of predictions. However, there was some interesting information that resulted from one broad survey with the top two threats an enterprise will likely to face in 2017.

#1 Insider Threats (employees, contractors, vendors and other insiders). The survey determined that more than 28 percent of those asked believed this was the top threat and a direct threat to their enterprise's intellectual property. This threat is primarily resulting from two specific issues: disgruntled employees and theft of intellectual property for sale. The #1 threat also includes the malicious insider and the accidental insider threat. Perhaps the most frequent accidental insider threat was due to phishing emails targeting employees, including IT staff that allowed malicious outsiders to gain insider access to a system. CSOs and CISOs have faced these threats for years, but while this threat is well known and well understood, the tools and techniques continue to evolve and adapt to make insider threat protection a widely used security measure.

# 2 Corporate Cyber Espionage – The survey determined that more than 23 percent of those asked believed this was the top threat to their enterprise's intellectual property and the main threat that came from their competitors. Arguably, we are now operating in a global business environment that is much more competitive than anything we have seen in history. In December a lawsuit was filed by Heritage Auction House against world renown auction houses -- Christie’s and Collectrium over the theft of their sales data. Cases like that clearly illustrate the lengths that some companies will go to have an unfair competitive advantage. Cyber espionage is such a threat to companies and to the economy where they reside, that immediate action is required.

All too often enterprise security departments are not involved in the acquisition of human resources (contract, direct hires and so on). In addition, they are not involved in new resource indoctrination (on-boarding) or providing a basic educational program for all new human resources. Nor are they involved in vendor investigations prior to contracting.  While both of these areas take time and effort, given the continued risks of insiders and espionage, these areas must be properly addressed NOW!  Based on the public information available, one can only conclude that little attention has been paid to this issue for a number of reasons. None of which are good enough.

In September last year, a report titled “2016 Cost of Insider Threats” stated that on average, enterprises are spending $4.3 million yearly to mitigate, address, and resolve insider-related incidents. How does your organization’s figures compare to the numbers in that report? 

We had better get our arms around this problem.  The cost is extremely high and increasing, as is the frequency and complexity of these type of attacks continued to grow. While this threat is significant, there is one waiting that is far larger. Warming up in the wings is the next major challenge.  That subject will be addressed in my future blog posting.

KEYWORDS: cyber security enterprise security insider threats

Share This Story

Kevin Coleman is a dynamic speaker, author, advisor, and visionary that provides riveting insight on strategy, innovation, and the high velocity technology. He was Chief Strategist at Internet icon Netscape and at another startup that grew to be BusinessWeek’s 44th fastest growing company. He has spoken at some of the world’s most prestigious organizations, including the United Nations, the U.S. Congress, at U.S. Strategic Command, and before multiple Fortune 500 organizations and briefed executives in 42 countries around the world.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing