Report

Best Practices: Mitigating Insider Threat

Processes: The Zero Trust Security Playbook

March 18th, 2021
With contributors:
Stephanie Balaouras, Heidi Shey, Alexis Bouffard, Peggy Dostie

Summary

Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It’s difficult for security pros to detect this suspicious activity because insiders need to have privileged access to data to do their jobs. Since insiders are people and, therefore, entitled to privacy and due process, security pros must handle these incidents with greater care than external threats. This report describes how to build an insider threat program.

Want to read the full report?

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use costumer obsession to accelerate growth. That means empowering you to put the costumer at the center of everything you do: your leadership strategy, and operations. Becoming a costumer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.