COVID-19 , Governance & Risk Management , Insider Threat

The Insider Threat During a Pandemic

Joseph Blankenship of Forrester Says Enterprises Face Risks of Data Theft
Joseph Blankenship, vice president and research director, Forrester

Even in the best of economic circumstances, enterprises face risks of insiders stealing data or selling access to systems. But Joseph Blankenship of Forrester says the possibility of layoffs due to the COVID-19 pandemic puts enterprises at more risk of insider threats.

See Also: Live Webinar | Cybersecurity in Healthcare Supply Chains: A CISO Perspective

"We're reaching a period where everyone is somewhat uncertain," says Joseph Blankenship, a vice president and research director with Forrester. "A lot of the insider threat is driven by personal factors."

In this video interview with Information Security Media Group, Blankenship discusses:

  • How enterprises were caught flat-footed by the pandemic restrictions but are now calibrating to the rising risks of insider threats;
  • How behavioral analytics tools may be temporarily tripped by new work-from-home patterns;
  • How "zero trust" infrastructures could help during the pandemic.

Blankenship is a vice president and research director with Forrester. He covers risk, security infrastructure, security operations centers and tools such as SIEMs and SOAR. He formerly held senior marketing positions at McAfee, IBM and Vigilar.


About the Author

Jeremy Kirk

Jeremy Kirk

Managing Editor, Security and Technology, ISMG

Kirk is a veteran journalist who has reported from more than a dozen countries. Based in Sydney, he is Managing Editor for Security and Technology for Information Security Media Group. Prior to ISMG, he worked from London and Sydney covering computer security and privacy for International Data Group. Further back, he covered military affairs from Seoul, South Korea, and general assignment news for his hometown paper in Illinois.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.