preview

Reducing Insider Threat Risk, And Availability Of The Crown Jewels From Being Violated

Better Essays

It is crucial for an organization to have a “pre-hire” strategy or method for reducing insider threat, a “post-hire” strategy or method for reducing insider threat risk, and a strategy or method for quickly and efficiently handling an insider threat incident. It is essential in order to mitigate and eradicate the insider threat and prevent the confidentiality, integrity, and availability of the crown jewels from being violated. A “pre-hire” strategy or method for reducing insider threat risk is background screening. Through screening, an employer can avoid hiring someone potentially dangerous, unfit, or unqualified for work, which decreases the huge potential risk associated with employees. Although there isn’t a …show more content…

Essentially, it is crucial to have policies, practices, and procedures for careful selecting employees. As well as that organizations must state in the application form and employee manual that any falsehood or omission can result in termination regardless when it is discovered post-hire. In order to ensure the security of the organization, the same risk-management steps have to be applied to vendors and contingent workers such as independent contractors and temps. Some additional tools regarding identification and prevention of insider threat that can be used involve mental health assessments, psychological testing, physical security, supervisor and co-worker training to ensure capability in identifying red flags, identification of risk factors, culture of safety, reporting, and integrity, sharing and analyzing information associated with various agencies and sources, and implementing internal controls and continuous evaluation. All of these mentioned help ensure the security and protection of the crown jewels. A “post-hire” strategy or method for reducing the insider threat risk is ongoing screening and implementing controls and measures to regulate the environment and ensure physical safety. From the start of the hiring process, organizations should monitor and respond to behavior deemed suspicious. They should engage in

Get Access