<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How true is this?  Greatest Insider Threat is the C-Suite&amp;gt; in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36442#M4618</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From your experiences in the field?&amp;nbsp; Is this true?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.forbes.com/sites/louiscolumbus/2020/05/29/cybersecuritys-greatest-insider-threat-is-in-the-c-suite/#4cd3e357626f" target="_blank"&gt;https://www.forbes.com/sites/louiscolumbus/2020/05/29/cybersecuritys-greatest-insider-threat-is-in-the-c-suite/#4cd3e357626f&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:33:08 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2023-10-09T09:33:08Z</dc:date>
    <item>
      <title>How true is this?  Greatest Insider Threat is the C-Suite&gt;</title>
      <link>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36442#M4618</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From your experiences in the field?&amp;nbsp; Is this true?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.forbes.com/sites/louiscolumbus/2020/05/29/cybersecuritys-greatest-insider-threat-is-in-the-c-suite/#4cd3e357626f" target="_blank"&gt;https://www.forbes.com/sites/louiscolumbus/2020/05/29/cybersecuritys-greatest-insider-threat-is-in-the-c-suite/#4cd3e357626f&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:33:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36442#M4618</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T09:33:08Z</dc:date>
    </item>
    <item>
      <title>Re: How true is this?  Greatest Insider Threat is the C-Suite&gt;</title>
      <link>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36447#M4620</link>
      <description>&lt;P&gt;I'd buy that.&amp;nbsp; I once had a Sr. Manager (C-suite) open an email with the subject ILOVEYOU.......&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 05:30:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36447#M4620</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2020-06-15T05:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: How true is this?  Greatest Insider Threat is the C-Suite&gt;</title>
      <link>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36448#M4621</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/715155969"&gt;@dcontesti&lt;/a&gt;&amp;nbsp;&amp;nbsp; I can only imagine, I hope it did not have a payload attached to it??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 05:46:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36448#M4621</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-06-15T05:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: How true is this?  Greatest Insider Threat is the C-Suite&gt;</title>
      <link>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36462#M4622</link>
      <description>&lt;P&gt;I had the same thing happen.&amp;nbsp;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;,&amp;nbsp;the reference is to &lt;A href="https://en.wikipedia.org/wiki/ILOVEYOU" target="_blank" rel="noopener"&gt;this&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 12:07:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36462#M4622</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2020-06-15T12:07:08Z</dc:date>
    </item>
    <item>
      <title>Re: How true is this?  Greatest Insider Threat is the C-Suite&gt;</title>
      <link>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36468#M4625</link>
      <description>&lt;P&gt;My disagreement is with the use of the word threat. I view insider threat as usually having malicious intent. Maybe that is just my work in the intelligence field creating my bias. I would expect the C-suite to be targeted more, yes, and I see their point in that SOME C-suite executives have a "My way or the highway" type of rule. Cyber security has also been accused of being the other side of the coin being "No way, no how, not going to happen." It is our job to bridge the gap between the need to get business done and to do it in a secure manner. Along this path we often have to educate the c-Suite into better ways of doing their jobs (like not clicking on every email!). We also have to learn how to categorize risk appropriately, present the risks adequately and inform the business leaders of the potential ramifications of not taking security seriously or ignoring security to get the job done quicker. Usually if the c-suite wants to continue I just ask them to sign off on a risk acceptance form, showing that they have been made aware of the risks and are OK assuming the acceptance of the risk if it goes bad. This usually either satisfies my requirements or causes them to do some more research into what they were wanting to do.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 15:01:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36468#M4625</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2020-06-15T15:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: How true is this?  Greatest Insider Threat is the C-Suite&gt;</title>
      <link>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36478#M4626</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/715155969"&gt;@dcontesti&lt;/a&gt;&amp;nbsp;&amp;nbsp; I can only imagine, I hope it did not have a payload attached to it??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Yes it had the full payload attached.....when asked why he opened it, his answer "He was curious why someone would send him a note with that subject."&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I can say that after this event, he led the charge for Security Awareness for Executives.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 18:15:51 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36478#M4626</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2020-06-15T18:15:51Z</dc:date>
    </item>
    <item>
      <title>Re: How true is this?  Greatest Insider Threat is the C-Suite&gt;</title>
      <link>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36480#M4627</link>
      <description>&lt;P&gt;Didn't see a publish criteria referenced in the article to support the conclusion just an argument stated as fact because the author says so.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My perspective would be to use a common criteria based on damage. A weighted average of initial monies lost, reputation loss and monies and reputation over time comparing the C-suite compared to 'all others' would be a better metric. I know I have seen far more minor losses over time by clerks and analysts that don't make headlines but can lead to a death by a thousand cuts. Where an executive may, well intentionally wire transfer 250,000 dollars to the Bahamas. Naturally, the exec gets a great deal of attention while the small incidents are soon forgotten. Well, until review time, of course.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A good, well meaning article but one lacking criteria to back it up. If there is such, just tell me and I will go back and reread.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;b/eads&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 18:18:38 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36480#M4627</guid>
      <dc:creator>Beads</dc:creator>
      <dc:date>2020-06-15T18:18:38Z</dc:date>
    </item>
    <item>
      <title>Re: How true is this?  Greatest Insider Threat is the C-Suite&gt;</title>
      <link>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36481#M4628</link>
      <description>&lt;P&gt;Considering that we are talking about Insider &lt;STRONG&gt;Threat&lt;/STRONG&gt;, it would mean people with malicious intent to case harm. Describing C-Suite as a threat is, n my opinion, stretching truth a bit far.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are they a vulnerability? Absolutely. They seem to be targeted more. Attackers tend to spend more time and resources when targeting them. Yes, they do end up clicking the wrong link or opening the wrong attachment but they also get a large number of emails.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They are a big vulnerability since the impact of their account compromise is big.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Guess which is the other group, almost universally, who tend to be clicker heroes? IT guys. Oh! the irony.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What can we do? More awareness and enforcing least privilege/ need to know. Perhaps that can mitigate this problem a little bit.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 18:24:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36481#M4628</guid>
      <dc:creator>sanjeev41924</dc:creator>
      <dc:date>2020-06-15T18:24:19Z</dc:date>
    </item>
    <item>
      <title>Re: How true is this?  Greatest Insider Threat is the C-Suite&gt;</title>
      <link>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36482#M4629</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1602421967"&gt;@CISOScott&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;My disagreement is with the use of the word threat. I view insider threat as usually having malicious intent. Maybe that is just my work in the intelligence field creating my bias. I would expect the C-suite to be targeted more, yes, and I see their point in that SOME C-suite executives have a "My way or the highway" type of rule. Cyber security has also been accused of being the other side of the coin being "No way, no how, not going to happen." It is our job to bridge the gap between the need to get business done and to do it in a secure manner. Along this path we often have to educate the c-Suite into better ways of doing their jobs (like not clicking on every email!). We also have to learn how to categorize risk appropriately, present the risks adequately and inform the business leaders of the potential ramifications of not taking security seriously or ignoring security to get the job done quicker. Usually if the c-suite wants to continue I just ask them to sign off on a risk acceptance form, showing that they have been made aware of the risks and are OK assuming the acceptance of the risk if it goes bad. This usually either satisfies my requirements or causes them to do some more research into what they were wanting to do.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;So on initial reading I agree that Threat may not be the correct word and not sure what the right one is.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, I have always broken "Insider Threat" down as malicious user, compromised users and last but not least Careless users.&amp;nbsp; I consider the C-Suite users referred to as being careless users.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just my thoughts&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 18:28:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36482#M4629</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2020-06-15T18:28:35Z</dc:date>
    </item>
    <item>
      <title>Re: How true is this?  Greatest Insider Threat is the C-Suite&gt;</title>
      <link>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36493#M4631</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1602421967"&gt;@CISOScott&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;My disagreement is with the use of the word threat. I view insider threat as usually having malicious intent. Maybe that is just my work in the intelligence field creating my bias. uses them to do some more research into what they were wanting to do.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Kenneth's interpretation of the word &lt;EM&gt;threat&lt;/EM&gt;, along with subsequent comments in this thread, illustrate an issue we see repeatedly in INFOSEC: tight definitions of key words must always be provided in the context of usage.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For those of us who have worked in the area of risk management,&amp;nbsp;&lt;EM&gt;threat&lt;/EM&gt; is used without any pejorative implication of motivation or intent. The best example can be found in continuity of operations planning&amp;nbsp;(COOP) and business continuity planning (BCP). Major weather events such as thunderstorms, tornadoes, hurricanes, and floods are all &lt;EM&gt;threats&lt;/EM&gt;, but none of those events are malicious. They just are.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;The potential for misunderstanding the use of the term &lt;EM&gt;threat&lt;/EM&gt;&amp;nbsp;as illustrated here is why my risk taxonomy separates concepts into two terms: &lt;EM&gt;threat&lt;/EM&gt; and &lt;EM&gt;threat actor&lt;/EM&gt;. Phishing e-mails are &lt;EM&gt;threats.&lt;/EM&gt; People who intentionally send phishing mails are &lt;EM&gt;threat actors&lt;/EM&gt;.&amp;nbsp; My best real world story on contextual definitions is when two mid-level managers got into a screaming match when they actually agreed with each other on firewall traffic policies. One was thinking of the TCP/IP stack&amp;nbsp; definition of &lt;EM&gt;protocol&lt;/EM&gt;, and the other was considering &lt;EM&gt;protocol&lt;/EM&gt; in the looser usage in naming of such as ftp and http.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To further extend this definition of &lt;EM&gt;threat&lt;/EM&gt; we need to address a specific insider threat concept, that of malicious and non-malicious intentional acts by insiders, the subject of my dissertation research. We know that users will intentionally violate selected security rules with no malicious intent, when doing so assists them in getting their primary jobs done. You can see me pontificate on this aspect in my 25 minute presentation, &lt;STRONG&gt;&lt;A href="https://www.youtube.com/watch?v=VhkH3BfWcd8" target="_blank" rel="noopener"&gt;"Why don't they follow the rules? Maybe its the boss's fault!"&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 21:26:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36493#M4631</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2020-06-15T21:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: How true is this?  Greatest Insider Threat is the C-Suite&gt;</title>
      <link>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36504#M4633</link>
      <description>&lt;P&gt;Craig,&lt;/P&gt;&lt;P&gt;Thanks for putting it so eloquently. To me when I hear the word threat, it indicates an immediate response is required where a risk or vulnerability we have time to remediate or lessen the impact. If I have an active insider threat, I need to be monitoring, auditing, intervening, and actively trying to shut it down. If it is just an uninformed executive who &lt;STRONG&gt;might &lt;/STRONG&gt;click on a phishing email, then I have time to ensure my user education is improved, to install an anti-phishing product, to have a one-on-one security briefing, etc.&amp;nbsp; Where I live, a hurricane is a threat, but not in November through April, and only when there is a named storm. Which then we usually have days to weeks to prepare. Any user is a threat to do something bad, whether malicious or not, to me an insider threat is something requiring an immediate response. Perhaps insider risk would be a better title.....&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 11:08:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36504#M4633</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2020-06-16T11:08:49Z</dc:date>
    </item>
    <item>
      <title>Re: How true is this?  Greatest Insider Threat is the C-Suite&gt;</title>
      <link>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36531#M4641</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of the reasons I got into this field is that I was appalled by how lightly security would often be taken in organizations I was with before.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2 examples from a single organization, where I was working as a system admin: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1&lt;/STRONG&gt;) A director had a dedicated WiFi channel with full intranet access &amp;amp; unrestricted internet access, of which he'd&lt;SPAN&gt;&amp;nbsp;tend to share the WPA key with whoever visited him --- it would never be changed!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2&lt;/STRONG&gt;) The GM once called me to check an issue on his Mac;&amp;nbsp; while I was at it, he excused himself to grab his lunch --- leaving me with full access to his laptop, with the emails &amp;amp; all the info there. (Worse, he didn't bother to log off)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(Most ironic was that this organization got itself certified in ISMS)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyways, back to these examples, while I see anything that may compromise IT Security as a threat --- be it malicious or not --- we might consider these as vulnerabilities that have been created, &amp;amp; could potentially be exploited. In the case of &lt;STRONG&gt;1&lt;/STRONG&gt;, an outsider could get access to the internal network to launch an attack or carry out reconnaissance; with&lt;STRONG&gt; 2&lt;/STRONG&gt;, the GM's system could be used to send out fake emails, or there may be data leakage / theft.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the parties that have malicious intentions and take advantage of these vulnerabilities could be seen as the threat actors, rather than the executives themselves.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What's your view on all this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 20:50:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-true-is-this-Greatest-Insider-Threat-is-the-C-Suite-gt/m-p/36531#M4641</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2020-06-16T20:50:50Z</dc:date>
    </item>
  </channel>
</rss>

