
How the U.S. is Tapping a Much Bigger Well in The Middle East
EXPERT DEEP DIVE – President Donald Trump’s first official trip to the Middle East during his current administration may have tapped a well that runs […] More
The most infamous spies, moles, and saboteurs have come from intelligence and military organizations. However, recent allegations made against an employee by Tesla CEO Elon Musk, serve as a stark reminder that private companies also find themselves vulnerable to potential malicious insiders capable of causing millions of dollars in damage by stealing intellectual property, damaging facilities or leaking information that can embarrass the organization.
Many private companies that do classified work for government agencies have developed comprehensive programs to identify and mitigate insider threats due to changes in regulations governing such sensitive work. Beyond these firms, however, corporate leaders face a balancing act of security and risk as they determine the right balance of resources to devote to protect themselves, their customers, and their shareholders.
In public comments and internal communications over the past week, Musk alleged that at least one Tesla employee had stolen company secrets, and shared that information with third parties. The company filed a lawsuit against the employee, who says he is the victim of backlash and calling himself a whistleblower – on June 20 for stealing confidential data and hacking manufacturing operating systems. Three days earlier, in an email sent to all Tesla employees, Musk asserted that a disgruntled employee who had not received a promotion engaged in “extensive and damaging sabotage” by modifying critical computer code and sending sensitive proprietary information to outsiders. Hours later, Musk sent another all-hands email about a fire on a production line. Calling it “another strange incident that was hard to explain,” Musk asked employees to be alert to suspicious activities, writing, “only the paranoid survive.”
Paranoia, unfortunately, is not a particularly effective strategy for identifying malicious insiders – particularly given the Ponemon Institute finding that 59 percent of departing employees take company data with them when leaving their employers and that 24 percent had access to their employers’ computer systems after quitting. While most companies, like Tesla, do have robust security practices, the Tesla incident serves as a strong reminder that executives need to take a strategic, long-term approach to corporate security that includes protecting against cyberattack, physical attacks, and insider threats.
Corporate leaders’ focus on reducing short-term overhead costs make them reluctant to invest in insider security programs whose return on investment – the prevention of damage – is difficult to calculate. But an insider threat program must be seen as a long-term investment in protecting company assets. Just as an insurance policy hedges against the risk of incurring far larger costs, insider threat programs are a bargain compared to the damage that a disgruntled or careless employee could cause to a company’s reputation or bottom line.
Organizations’ greatest insider threat concerns include preventing theft of data or intellectual property, fraud, information technology (IT) sabotage and workplace violence – any of which can cause incalculable damage to a company’s brand, R&D investments, and future revenues. Common pitfalls include addressing such threats in organizational stovepipes – such as facility security, cybersecurity, or human resources – or by focusing on a purely technical fix without considering people-centric solutions. But by taking a cross-departmental approach and integrating insider threat programs into the fabric of the company, organizations can maintain their competitive edge and address common concerns from all areas of the business.
Effective insider threat programs examine multiple facets of employee conduct, such as network use, performance, and policy compliance. Managers, working with human resources staff, could flag employees who demonstrate troubling workplace behavior or a failure to follow company policies. Data monitoring tools can establish baseline network behavior patterns for each employee, and security staff with effective monitoring and data analytics tools could flag anomalous conduct or detect atypical amounts of data flowing out of the company’s networks from a particular user. Company-wide efforts raise the likelihood that malicious activity could be identified before an employee sabotages a project or walks out the door with valuable corporate secrets.
Employees under significant stress have the potential to cause physical harm as well as damage to networks or intellectual property. Workplace violence – another form of insider threat – not only presents a serious safety risk, but negatively affects employee morale and performance, erodes public confidence, and potentially leads to costly litigation. It is highly unusual for employees to “crack” suddenly; typically, research shows, they exhibit a series of behaviors over time. These patterns can be identified through a strong insider threat program, as they are observable in the employee’s network usage, as well as by co-workers and supervisors who have been trained to identify signs of concerning conduct.
Although many companies will seek to terminate an employee engaging in concerning behaviors, other options exist for managing at-risk employees who are identified early through continuous evaluation and co-worker input. For example, a firm can offer counseling resources or move the staff member to a less stressful position that does not involve access to sensitive information. An insider threat program can thus assist troubled employees while protecting the company’s people, facilities, and information.
Protecting a company’s assets from malicious insiders requires the detection of precursor activities – small transgressions that raise red flags – that manifest themselves before damage occurs. Identifying such signposts requires input from stakeholders throughout the company, including IT, human resources, security and individual employees.
Paranoia about spies and saboteurs will not defend a company from harm. A comprehensive insider threat program is critical to protecting a corporation’s people, facilities, networks, and ideas. Any company operating without an insider threat program is inviting disaster.
Related Articles
EXPERT DEEP DIVE – President Donald Trump’s first official trip to the Middle East during his current administration may have tapped a well that runs […] More
DEEP DIVE – Coverage of the U.S.-China tariff war has focused on the impact for consumers – the potential for spikes in the prices of […] More
BOTTOM LINE UP FRONT – As the U.S. faces unprecedented threats from cyberattacks, experts are warning about the impact of cuts to the nation’s cyber […] More
EXCLUSIVE INTERVIEW – It’s hard to overstate the complexity and importance of the work of the National Geospatial-Intelligence Agency (NGA), which — by its own […] More
EXPERT INTERVIEWS – Ukrainian President Volodymyr Zelensky announced this week that Ukraine plans to take an already-booming domestic drone industry and boost it to “the […] More
EXCLUSIVE CIPHER BRIEF REPORTING — The Cipher Brief was the first to report on Thursday in the weekly Dead Drop column that Director of the […] More
Search