May 24, 2021

Dealing with insider risk in the era of remote work

Ashish Malpani

In the hyper-distributed work environment of today, employees, contractors, and partners work from everywhere and have access to company’s data and critical IP that is spread across corporate PCs, mobile devices, on-premises and different cloud applications. Organizations are increasingly concerned that the new normal has resulted in less visibility and increased insider risk forcing security teams to re-think cybersecurity.

Forrester Insider Threat Assessment

Forrester and Forcepoint together recently conducted a study to understand insider threat initiatives worldwide with 300 decision-makers.

We used the results to create an insider threat maturity model that mapped various attributes to organizational capabilities. These results highlighted various strengths of high-maturity organizations e.g. these organizations using more indicators to detect insider threats.

They are much more likely to collaborate with Human Resources on this front and monitor attempts to obfuscate sensitive data and abnormal network or system reconnaissance activities.

Forrester Report - Insider Threat Initiatives

On the other hand, a large share of companies in the low maturity category still think of themselves as mature and consider their technology effective, although many of them are lacking collaboration between stakeholders. These organizations experience difficulties setting up processes in a way that doesn't impede employee productivity while not violating their privacy. Additionally, low maturity companies are often not able to enforce the defined policies to protect data and systems.

One other insight from the survey: it is critical that organizations be transparent with their employees as they evolve their insider threat programs, including what is being monitored, what kicks off an investigation and who has access to data and how the data is used.

To ensure true data protection across endpoint, infrastructure, and cloud security, leaders not only have to provide secure access to enable work from everywhere but also understand the insider risk and adopt automated risk adaptive data protection technology that secures data at rest, in-motion, and in-use across hybrid environments.

Take the short 5-minute self-assessment to see how your organization’s insider threat program compares to your peers. In return, you’ll receive actionable steps to advance your insider threat maturity.

Image of Ashish Malpani

Ashish Malpani

Senior Director of Solutions Marketing

Ashish Malpani is the Senior Director of Solutions Marketing at Forcepoint. In his 20 years of experience, he has held marketing and product leadership roles at information security and systems companies including HID Global, Dell-EMC, and Gemalto (...

Read more articles by Ashish Malpani

About Forcepoint

Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.