Insider threat response and recovery strategies in financial services firms

Over the past decade, the number and scale of attacks carried out by insiders has seen a steady increase. 1 Financial services firms, in particular, have been frequent targets of insider attacks. 2 Historically, the information security efforts of financial services firms have centred on defending external borders from intrusion by nefarious outsiders. More recently, however, security debates have broadened to include trusted employees, contractors and business partners. 3 Financial services institutions have grown increasingly aware of the changing threat landscape and the debilitating effects of insider attacks on the confidentiality, integrity and availability of financial data and systems. 4 Over the past decade, the number and scale of attacks carried out by insiders has seen a steady increase. Financial services firms, in particular, have been frequent targets of insider attacks. Financial services firms have mostly focused on defending against outsiders. Recently, however, debate has broadened to include trusted employees, contractors and business partners. Jacqueline Eggenschwiler, Ioannis Agrafiotis and Jason RC Nurse of the University of Oxford survey what we know about the threat management programmes employed by such firms.

[1]  Hung Q. Ngo,et al.  Insider Threat Analysis Using Information-Centric Modeling , 2007, IFIP Int. Conf. Digital Forensics.

[2]  Dennis Kundisch,et al.  New Strategies for Financial Services Firms: The Life-Cycle-Solution Approach , 2003 .

[3]  Ram Dantu,et al.  Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals , 2016, J. Internet Serv. Inf. Secur..

[4]  Sadie Creese,et al.  Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection , 2013, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[5]  N. Denzin,et al.  The SAGE handbook of qualitative research , 2005 .

[7]  Dawn M. Cappelli,et al.  Common Sense Guide to Mitigating Insider Threats 4th Edition , 2012 .

[8]  John Sullivant Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency , 2016 .

[9]  Stephen H. Conrad,et al.  A behavioral theory of insider-threat risks: A system dynamics approach , 2008, TOMC.

[10]  Martin C. Libicki,et al.  A Framework for Programming and Budgeting for Cybersecurity , 2016 .

[11]  Sadie Creese,et al.  Understanding Insider Threat: A Framework for Characterising Attacks , 2014, 2014 IEEE Security and Privacy Workshops.

[12]  Sadie Creese,et al.  A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches , 2014, HCI.

[13]  V. Braun,et al.  Using thematic analysis in psychology , 2006 .

[14]  Dawn M. Cappelli,et al.  Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector , 2005 .

[15]  Parmvir Singh The role of Banking and Financial Services industry in economic recovery , 2015 .

[16]  Gabriel Ong,et al.  Combating Violent Extremism and Radicalization in the Digital Era , 2016 .

[17]  Robin M. Ruefle,et al.  Components and Considerations in Building an Insider Threat Program , 2013 .

[18]  David S. Wall,et al.  White Paper : Data Loss Prevention Organizational Security and the Insider Threat : Malicious , Negligent and Well-Meaning Insiders , 2022 .

[19]  Chris Wargo,et al.  An Introduction to Insider Threat Management , 2007, Inf. Secur. J. A Glob. Perspect..