WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Insider Threat Detection needs to be Proactive
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Insider Threat Detection needs to be Proactive

Author: Jennifer Walker

Created: Tuesday, September 7, 2021 - 18:51

Categories: Cybersecurity, Security Preparedness

A recent cybersecurity report found that organizations frequently miss the warning signs associated with an insider threat. The study, The State of Insider Threats 2021: Behavioral Awareness & Visibility Remain Elusive, surveyed 1,249 cyber professionals and utilized their responses along with thousands of past insider threat investigations and incidents to formulate its results. The report found that insiders usually follow the same five basic steps in their attack – known as the insider threat kill chain. The five steps include: reconnaissance, circumvention, aggregation, obfuscation, and exfiltration. The study also demonstrated that almost half of the companies surveyed found it impossible or very difficult to prevent an insider attack at the earliest stages of the insider threat kill chain and only 32 percent of respondents said their company was very or highly effective in preventing the leakage of sensitive information. According to Rajan Koo, Chief Customer Officer, at DTEX Systems, the report’s “findings indicate that in order to fully understand any insider incident, visibility into the nuance and sequence of human behavior is pivotal.” Therefore, the more effective organizations become at monitoring specific behavioral indicators and intervening early when a suspicious action is detected, than the more secure they will be against insider threats going forward. Read more at HelpNetSecurity.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar