Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/26/2012
03:57 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

U.S. Intel Chief: Insider Leaks A Top Priority

Strategies to prevent another Wikileaks will take years to perfect, but the cloud could save time and money, says director of national intelligence James Clapper.

>Slideshow: Next Generation Defense Technologies
Slideshow: Next Generation Defense Technologies
(click for larger image and for full slideshow)
Building the architecture necessary to prevent another Wikileaks might take several years, director of national intelligence James Clapper said at an event Thursday in Washington, D.C.

The Wikileaks scandal, in which 260,000 diplomatic cables, many of them sensitive, were burned onto CD-RWs and later published online, has accelerated work toward ensuring that information sharing is secure, Clapper said in a speech on information sharing at the Center for Strategic and International Studies. However, there is no silver bullet to preventing insider threats.

"Inherently, we've always had a responsibility for protecting against insider threats," Clapper said in a speech on information sharing at the Center for Strategic and International Studies. "Wikileaks has heightened our sensitivity. In the IT context, the insider threat is quite profound, and that's why everybody is more sensitized to being alert."

The intelligence community is taking a multi-pronged approach to addressing the insider threat problem, Clapper said. Among other things, the community is developing a "national insider threat policy," is investing heavily in more pervasive auditing and monitoring capabilities, is improving identity management, and is tagging data as a means of access control. In addition, any of the policies and procedures around removable media have already been overhauled, and security clearance procedures are continuing to improve, he said.

[ How one thieving employee embarrassed a conglomerate: Citigroup Case Spotlights Insider Threat Dangers. ]

More broadly, Clapper said, the insider threat efforts are just one piece of the intelligence community's information sharing efforts that aim to get analysts and others who need the information "the right data, any time, any place, usable by any authorized recipient, prevented only law – not technology – and protected by a comprehensive regimen of accountability." That, he said, represents "nirvana" and is "not an easy task."

The ever-increasing imperative for secure information sharing, when coupled with increased budget pressure, has also created another consequence, Clapper said. For the first time ever, he said, the intelligence community is working together on "an integrated IT enterprise across the major intelligence agencies." Although it is something that agencies have been discussing for some time, he said, recent budget pressures have helped push the idea toward reality.

Cloud computing likely will play a significant role in the evolution of an integrated IT infrastructure within the intelligence community. The cloud has a "huge potential for achieving savings and promoting integration," he said.

Heightened concern that users could inadvertently expose or leak--or purposely steal--an organization's sensitive data has spurred debate over the proper technology and training to protect the crown jewels. An Insider Threat Reality Check, a special retrospective of recent news coverage, takes a look at how organizations are handling the threat--and what users are really up to. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
1/28/2012 | 3:38:22 AM
re: U.S. Intel Chief: Insider Leaks A Top Priority
On the psychology of the insider threat:
http://www.symantec.com/about/...
Brian Prince, InformationWeek/Dark Reading Comment Moderator
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/13/2020
Where are the 'Great Exits' in the Data Security Market?
Dave Cole, Cofounder and CEO, Open Raven,  10/13/2020
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11496
PUBLISHED: 2020-10-19
Sprecher SPRECON-E firmware prior to 8.64b might allow local attackers with access to engineering data to insert arbitrary code. This firmware lacks the validation of the input values on the device side, which is provided by the engineering software during parameterization. Attackers with access to ...
CVE-2020-15822
PUBLISHED: 2020-10-19
In JetBrains YouTrack before 2020.2.10514, SSRF is possible because URL filtering can be escaped.
CVE-2020-24375
PUBLISHED: 2020-10-19
A DNS rebinding vulnerability in the UPnP MediaServer implementation in Freebox Server before 4.2.3.
CVE-2020-7193
PUBLISHED: 2020-10-19
A ictexpertcsvdownload expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
CVE-2020-7194
PUBLISHED: 2020-10-19
A perfaddormoddevicemonitor expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).