This resource is no longer available
DTEX AND THE Insider Threat Kill Chain
Most security threats follow a pattern of activity during an attack, and insider threats are no exception. Lockheed Martin’s Cyber Kill Chain outlines the steps that APT attacks tend to follow from beginning to end. Since human behavior is more nuanced than machine behavior, however, insider attacks follow a slightly different path.
You must ask, ‘What was the user’s intent?’, ‘What it truly an insider, or were credentials compromised?’, ‘If so, how did the credential thief get into the account?’.
Preventing these attacks requires visibility and intelligence.
Read on to learn about the Insider Threat Kill Chain, which encompasses the 5 steps present in nearly all insider attacks.