Hunting Insider Threats: How to Establish Your Insider Threat Team

By: Arieanna Schweber | 8/8/2016

Forrester estimates that Insiders were responsible for 39% of data breaches in 2015. These internal incidents account for more breaches than external attacks alone. Worse still, 38% of external attacks are correlated with an insider incident. The rise in BYOD devices and personal cloud applications has led to a dramatic growth of Shadow IT, where data is being used or stored outside the visibility and control of IT. This data is at great risk of being breached due to employee negligence or misuse or outside attack.

How do you combat the Insider Threat? Build your Insider Threat team with insights from a new Forrester whitepaper hosted by Absolute, Hunting Insider Threats: Forrester’s Model for Establishing An Insider Threat Team.

Specifically, this whitepaper explores:

  • The three types of insider threats
  • Detailed plans for a 10-step insider threat program
  • Advice on how to recruit employees advocates into your program

These threats are not just a “technology” problem, even though technology can play a part in the solution. Mitigating and detecting insider threats requires the involvement of the whole organization. It follows that companies that create a culture of security will be more successful in protecting their data. Everyone has a role to play in data protection, so establishing defined processes and teams will go a long way to addressing internal data misuse.

Download the full whitepaper to learn more about how to prevent customer identity theft, financial fraud, or intellectual property theft caused by the Insider Threat.

With the growth in mobility, personal device use and the personal cloud, many Insider Threats originate at the endpoint. Given the current lack of control over devices used off-network, Insiders pose an even greater threat. This is the reason that organizations must address the growth of Shadow IT. At Absolute, we provide unprecedented visibility into your fleet of endpoint devices.  Thanks to our innovative capabilities, you can identify and track sensitive data across endpoints. You can also take proactive action to enforce corporate data policies or remediative action if the data is threatened. Learn more at

Financial Services