Premise:
The US media has been reporting on a new intelligence report from the Department of Homeland Security that was issued on July 19, 2011. This report highlights the silent risk that operators of critical infrastructure have been living with – Insider Threat.
A new intelligence report from the Department of Homeland Security issued Tuesday, titled Insider Threat to Utilities, warns "violent extremists have, in fact, obtained insider positions," and that "outsiders have attempted to solicit utility-sector employees" for damaging physical and cyber-attacks.
Postings on the ABC News blog site Blotter go on to report, "Sabotage by an insider at a major utility facility, including a chemical or oil refinery, could provide al Qaeda with its best opportunity for the kind of massive Sept. 11 anniversary attack Osama bin Laden was planning, according to U.S. officials." The report goes on to say, "The only way you can actually kill the large scale number of Americans that [bin Laden] literally was calculating was through the use of this critical infrastructure," Chad Sweet, former DHS chief of staff and co-founder of the Chertoff Group, told ABC News.
The ability for violent activists to pose as an insider, or compromise an insider can increase the adverse impact of the attack, making it harder to detect and thus, increasing the likelihood of success.
The Outlook:
Insider threat must be considered an Advanced Persistent Threat (APT), requiring all organizations to have a mitigation plan in place. Larger organizations with multiple locations and operating assets that are geographically dispersed, as is the case with Supervisory, Control and Data Acquisition (SCADA) systems, will have a much harder time completing the steps required for threat mitigation due to the complexities involved and the number of underlying systems that contain all the information needed. The danger is that these organizations may just resign themselves to living with the risk.
Threat Mitigation:
Traditional mitigation strategies can be complex, laborious and time consuming. AlertEnterprise recommends using technology now available to:
1. |
Centralize on-boarding / off-boarding for employees and contractors and enable background checks, certifications and references to be automated. Checks can be done more frequently and changes in conditions can be alerted on. |
2. |
Automate the identity validation of all contractors and employees entering a secured facility by seamlessly integrating with the Physical Access Control Systems (PACS), as well as the enterprise IT applications. |
3. |
Monitor access to remote and on-site access of facilities, critical systems, assets and information. |
4. |
Actively enforce an access authorization model that extends beyond IT to include physical access and SCADA access. |
5. |
Validate contractor and employee physical access with actual service requests for that location by comparing in real-time with workforce management systems or ticketing systems. |
6. |
Ensure that both physical access and system access is removed immediately upon employee or contractor termination. |
AlertEnterprise Readies for Phenomenal Growth in Asia-Pacific with the Opening of a Subsidiary in Singapore
|
AlertEnterprise, Inc. a leading provider of enterprise security software for critical infrastructure protection, cross-enterprise business application security and the true prevention of insider threat, has opened a subsidiary in Singapore with the addition of Mr. Christoph Theisinger as Vice President for the Asia-Pacific and Middle East regions.
The new office in Asia-Pacific will enable AlertEnterprise to keep pace with the growth opportunities in the APAC regions and enhance the ability to provide local support to the customer and partner base in those regions.
"Establishing a subsidiary in Singapore further validates global recognition and interest in demands that AlertEnterprise will continue to address across global markets," says Jasvir Gill, AlertEnterprise Founder and CEO. "There is a tremendous interest in our solutions, particularly from the utility, oil and gas and public sector industries. We are in a unique position to execute on our vision to deliver next-generation technology that will help companies around the globe to address challenges with managing insider threat and sabotage, amongst many other critical areas."
<< View Full Release >>