Companies that use technology to help thwart internal threats to their information systems can also lower IT labor costs and contribute to corporate liquidity, according to new research from AberdeenGroup.
The research, presented in "The Insider Threat Benchmark Report: Strategies for Data Protection," demonstrates that a company's ability to boost profits, reduce expenses and contribute to its liquidity requires interaction between operations, audit, networking and application development. This is driving the growth of operational and audit expertise to address inadvertent and intentional leakage of company information. Also, regulatory requirements increase the need for physical controls and software access controls to secure confidential client and company information.
As a first step to attaining best-in-class success, companies must understand the interaction between operations, audit, networking, and application development, and should evaluate their processes to ensure they:
- Use access control lists to monitor the applications and resources employees utilize;
- Remember that "one size does not fit all" and IT vendors may not support the same protocols and standards;
- Balance quantitative and qualitative measurements;
- Balance the cost of implementing technology with reducing risk; and
- Develop contingency plans in the advent of insider attacks.
The Insider Threat Benchmark Report arms readers with actionable frameworks to benchmark their security programs against industry average and best-in-class performers.
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access