Insider Threats in the Financial Sector: Motivations, Methods, and Detection Timelines
APA Citation
Taylor, N. & Sharma, V. (2024). Insider Threats in the Financial Sector: Motivations, Methods, and Detection Timelines. *Journal of Information Security and Applications*. https://doi.org/10.1016/j.jisa.2024.103789
View original paper →What Did This Cybersecurity Research Find?
This cybersecurity insider threat study analyzed 200 confirmed insider incidents at financial institutions over a five-year period to identify motivations, methods, and detection timelines. Cybersecurity insider incidents in finance took a median of 197 days to detect, with financial gain as the primary motivation (54%), followed by disgruntlement (23%) and coercion/recruitment by external actors (12%). Behavioral analytics detected insiders 45% faster than traditional access monitoring.
Key Findings
- 1Median insider threat detection time: 197 days in financial institutions
- 2Financial gain motivated 54% of insider incidents; disgruntlement drove 23%
- 3External recruitment or coercion was behind 12% of insider incidents
- 4Behavioral analytics reduced detection time by 45% compared to access log monitoring
- 5Privileged database administrators and system administrators accounted for 38% of high-impact incidents
How Does This Apply to Cybersecurity Careers?
Insider threat analysts can calibrate their detection programs against real-world timelines and patterns. Security leaders in financial services can design controls targeting the most common insider motivations and methods.
Who Should Read This?
Frequently Asked Questions
What did this cybersecurity research find?
This cybersecurity insider threat study analyzed 200 confirmed insider incidents at financial institutions over a five-year period to identify motivations, methods, and detection timelines. Cybersecurity insider incidents in finance took a median of 197 days to detect, with financial gain as the primary motivation (54%), followed by disgruntlement (23%) and coercion/recruitment by external actors (12%). Behavioral analytics detected insiders 45% faster than traditional access monitoring.
How is this research relevant to cybersecurity careers?
Insider threat analysts can calibrate their detection programs against real-world timelines and patterns. Security leaders in financial services can design controls targeting the most common insider motivations and methods.
Where was this cybersecurity research published?
This study was published in Journal of Information Security and Applications in 2024. The DOI is 10.1016/j.jisa.2024.103789. Access the original paper through the publisher link above.
Explore Related Cybersecurity Resources
Was this page helpful?
Get cybersecurity career insights delivered weekly
Join cybersecurity professionals receiving weekly intelligence on threats, job market trends, salary data, and career growth strategies.
Get Cybersecurity Career Intelligence
Weekly insights on threats, job trends, and career growth.
Unsubscribe anytime. More options