Black Hat 2024: Why Knowing Your Users is the Ultimate Defense

Proactive insider risk management is the name of the game, and DTEX Systems’ Blurred Lines event at Black Hat made such clear. Those in attendance no doubt have Black Hat 2024 in their rear-view mirror with a pronounced sense of the need to stay ahead of the miscreants targeting our ... Read More

Why Third-Party Insider Risk is an Overlooked Threat

Businesses have any number of people with access to their network at any given time. They have employees, yes. But they also have vendors, partners, contractors, and others – all with varying degrees of access to corporate assets and systems. Network interconnectivity, raw materials, finished goods, and the software within ... Read More

The Value of HR in Your Insider Risk Management Program

Companies hire people, and while every one of those individuals presents a potential risk, not all (hopefully none) will manifest as an insider threat to the company. As a human challenge, one cannot identify or address insider risks (or threats) without human-driven data and input. This is one but many ... Read More

User Behavior Analytics: Why False Positives are NOT the Problem

The axiom “garbage in, garbage out” has been around since the early days of computer science and remains apropos today to the data associated with user behavior analytics and insider risk management (IRM). During a recent Conversations from the Inside (CFTI) episode, Mohan Koo, DTEX President and Co-Founder, spoke about ... Read More

Potential Risk Indicator Decay and Insider Risk Management

Who among us hasn’t received an answer to what we thought was a precise question with, “it depends” and our mind remains befuddled. Potential Risk Indicators are like that: on the surface they seem to be very black and white, but they end up being various shades of gray dependent ... Read More

The Proactive Power of Tabletop Exercises in Insider Risk Management

As the adage goes, “practice makes perfect.” To get as close to perfection as possible in any endeavor, one must expect there to be an education and practice quotient. This is especially true for insider risk management (IRM), where there is no room for error. For an IRM team, tabletop ... Read More

Measuring the Efficacy of your Insider Risk Program

For those dealing with insider risks for as long as I have, justifying the mission can feel akin to providing results to Fermat’s Last Theorem.  There are solutions to each challenge, but maintaining and securing buy-in against competing budgetary requirements is easier said than done. This is why measuring the ... Read More

Insider Risk Detection: Data Relationships Tell the Whole Story

Data comes in a multitude of formats and flavors: physical, cyber, organizational, and, of course, the human sensors. Collecting data is easy – it’s the lowest hanging fruit. Capturing and correlating complete and accurate data sets is not as straightforward. And when the data is flawed, drawing meaningful findings and ... Read More

Insider Risk Detection: Data Relationships Tell the Whole Story

Data comes in a multitude of formats and flavors: physical, cyber, organizational, and, of course, the human sensors. Collecting data is easy – it’s the lowest hanging fruit. Capturing and correlating complete and accurate data sets is not as straightforward. And when the data is flawed, drawing meaningful findings and ... Read More

Insider Risk Management | Why You Need an Employee Assistance Program

There is no debate, regardless of sector, that an organization’s most valuable resource is its people. It makes sense then that an Employee Assistance Program (EAP) can support a holistic Insider Risk Management (IRM) program. Indeed, an EAP is a worthy investment that produces significant returns. The Case for an ... Read More