2020 Insider Threat Report

Download the 2020 Insider Threat Report by completing the form on the right.

Today’s most damaging security threats do not originate from malicious outsiders or external malware, but instead from trusted insiders with access to sensitive data and systems – both malicious and negligent insiders.

The 2020 Insider Threat Report reveals the latest trends and challenges facing organizations, how IT and security professionals are dealing with risky insiders, and how organizations are preparing to better protect their critical data and IT infrastructure.

Key findings include:

  • 53% of cybersecurity professionals confirm that the shift to cloud computing is making the detection of insider attacks more difficult.
  • 72% of organizations observed that insider attacks have become more frequent over the last 12 months. In fact, 65% have experienced one or more insider attacks within the last 12 months.
  • Despite 61% of businesses feeling like they have visibility into privileged accounts, only 22% feel they have visibility into the cloud. This variance may very well be indicative of different degrees of perceived risk and the corresponding degree of scrutiny.
  • Less than a third of businesses confirmed that they are monitoring abonormal user behavior across their cloud footprint. This is alarming considering the significant increase in usage of cloud apps and collaboration platforms – both of which are a popular egress point for both malicious and accidental insiders.

This 2020 Insider Threat Report has been produced by Cybersecurity Insiders, the 400,000
member community for information security professionals, to explore how organizations are responding to the evolving security threats in the cloud. We would like to thank Darktrace for supporting this research. We hope you’ll find this report informative and helpful as you continue your efforts in protecting your IT environments against insider threats.

We hope you’ll find this report informative and helpful as you continue your efforts in protecting your IT environments against insider threats.

More Popular Resources