The National Cyber Security Centre (NCSC) releases a publication on dealing with insider threats (in Dutch). The document is designed for government professionals seeking to address insider threats and those involved in establishing an insider risk policy.
What the publication addresses
The document provides advice and tips around several key questions, such as:
- What could be a potential target of insider threats, and how can you best protect it?
- How can insider threats be recognised in a timely manner?
- How do you respond to an incident, and how can its effects be mitigated?
- How can the risk policy be aligned with organisational goals and decision-making?
Tips and advice
Insiders can pose a significant cybersecurity risk to an organisation. The impact of an insider threat can be devastating. Unlike external cyber-attacks, insiders operate from within, making an insider an invisible enemy who can exploit authorised access to cause harm. How do you deal with this invisible enemy? Here are some tips:
- Identify critical processes.
- Establish criteria in advance for assessing signals.
- Incorporate soft controls into the insider risk policy.
- Focus on a strong network architecture.
- Develop a screening policy and be transparent about it.
- Lower the barrier for reporting suspicious situations.
More information
The publication includes many interesting links to other relevant publications. Download the NCSC’s publication to find out more.