Boardroom Tools

The Cyber-Insider Threat—a Real and Ever-Present Danger

By NACD Staff

01/16/2023

Cybersecurity Human Capital Boardroom Tool Member-Only

The Cyber-Insider Threat

OBJECTIVE OF THE TOOL: 
Of all the issues around cyber risk, perhaps the greatest challenge is mitigating the insider threat. The cyber-insider threat encompasses employees, contractors, vendors, and others who have legitimate access to the network, systems, and/or data of the organization to some degree. This Tool outlines the types of insider threats businesses face and questions boards should be asking to ensure management is adequately addressing insider threats

Verizon’s Data Breach Report identified five types of cyber-insider threats:

  • Careless Workers: Employees or partners who non-maliciously misappropriate resources, break acceptable use policies, mishandle data, install unauthorized applications, or use unapproved workarounds

  • Inside Agents: Insiders recruited, solicited, or bribed by external parties to exfiltrate data

  • Disgruntled Employees: Insiders recruited, solicited, or bribed by external parties to exfiltrate data

  • Malicious Insiders: Actors with access to corporate assets who use existing privileges to access information for personal gain

  • Feckless Third Parties: Business partners who compromise security through negligence, misuse, or malicious access to, or use of, an asset

Thank you for your interest in this page.

Member-Only Content

For full access, please log in, or explore membership options.

This article was informative.

No