Skip to main content
Logo GMV

Main navigation

  • Sectors
    • Icono espacio
      Space
    • Icono Aeronáutica
      Aeronautics
    • Icono Defensa y Seguridad
      Defense and Security
    • Icono Sistemas Inteligentes de Transporte
      Intelligent Transportation Systems
    • Icono Automoción
      Automotive
    • Icono Ciberseguridad
      Cybersecurity
    • Icono Servicios públicos Digitales
      Digital Public Services
    • Icono Sanidad
      Healthcare
    • Icono Industria
      Industry
    • Icono Financiero
      Financial
    • Icono Industria
      Services
    • All Sectors

    Highlight

    EMV Transit
    EMV Transit: technology that keeps on working
  • Talent
  • About GMV
    • Get to Know the Company
    • History
    • Management Team
    • Certifications
    • Corporate Social Responsibility
  • Communication
    • News
    • Events
    • Blog
    • Magazine GMV News
    • Press Room
    • Media library
    • Latest from GMV

Secondary navigation

  • Products A-Z
  • GMV Global
    • Global (en)
    • Spain and LATAM (es - ca - en)
    • Germany (de - en)
    • Portugal (pt - en)
    • Poland (pl - en)
    • All branches and all GMV sites
  • Home
  • Communication
  • News
Back
New search
Date
  • Cybersecurity

How to protect ourselves from the current boom of insider threats?

15/04/2019
  • Print
Share
GMV’s Javier Osuna spoke about his own experience and gave his opinion on insider threats, stressing that the digital transformation processes are inevitably blurring the physical and logical limits

Threats don’t come only from outside. One study estimates that almost 40% of IT security breaches are perpetrated by insiders. Some reports claim that over 50% of enterprises have suffered an insider attack in the last 12 months, while 90% declare themselves to feel vulnerable to insider attacks. Why do these attacks occur? In general to make an immediate profit but sometimes too for motives of revenge or future profit, such as carrying off data to a new job.

IT Digital Media has brought together cybersecurity experts to debate insider threats, which are becoming increasingly common and costly. Javier Osuna, GMV’s Manager of Cybersecurity Services and Consultancy Division, spoke about his experience and gave his opinion on insider threats, stressing that digital transformation processes are inevitably blurring the physical and logical limits. Aspects such as time to market, mobility, telework, the association and subcontracting of firms and individuals have opened up the field and lengthened the value- and supply-chains. As a result insider threats are now becoming an increasing peril, calling for a raising of awareness and a rethink in line with borderless protection.

When dealing with such a broad-ranging concept as insider threats, Javier Osuna argued that we should focus on the perpetrators and their motives. Who are the insiders and what are they after?

The insider is the essential link of a “dark chain” of information supplies, necessary for other purposes driven by various motives (political, economic, social, criminal, etc.). Their hazardousness resides in the insider’s trusted position and ease of access to sensitive systems or information without triggering alarms. This is a complex scenario in which authorized persons are those who access the sensitive information, the destination of that information then determining whether or not an incident ensues.

The motives are diverse, such as hacktivism or organized crime, industrial espionage or even inter-country spying and finally the inadvertent result of careless or less conscientious workers, or sometimes even victims of extortion.

GMV keeps a continuous watch on all these modus operandi to ensure secure use of IT recourses and all information handled by any organization, developing use models (each organization has its own use cases), to weigh up the danger of misuse of sensitive information, its ease of access or visualization and requirements for its distribution. This enables us to break down any information-leaking incidents into various types, ranging from monitoring of any activity with the organization’s data, giving advice on a “Forensic Readiness” basis to build up investigation skills against incidents of this type and finally establishing warnings of information misuse.

If money goes missing this sooner or later comes to light because it changes location or owner. Detecting the modification, duplication or access of information, however, is difficult. The owner, after all, still has it. On most occasions, therefore, we have to look outside to pinpoint information leaks. We at GMV complete the circle on the strength of CERT services and cyber-surveillance processes.

In short, much is said about the detection of anomalies, but we need to be careful here, because normality is not always desirable. The worst threat is an undetected one still considered to be normal.

  • VIDEO OF THE COMPLETE DEBATE
  • ITDM SPECIAL – INSIDER THREATS

 

  • Print
Share

Related

Ciberseguridad Andalucía 2025
  • Cybersecurity
GMV analyzes European cyberdefense challenges at the Andalusia Cybersecurity Conference
GMV participa en la Jornada de presentación de la Estrategia de Tecnologías Cuánticas de España 2025-2030
  • Cybersecurity
GMV participates in the presentation of the Quantum Technologies Strategy for Spain 2025-2030
CCI La Voz de la Industria Andalucia
  • Industry
  • Cybersecurity
CCI The Voice of the Industry of Andalusia (Seville)
15 May

9:00 AM - 3:30 PM

Contact

Isaac Newton, 11 Tres Cantos
E-28760 Madrid

Tel. +34 91 807 21 00

Contact menu

  • Contact
  • GMV around the world

Blog

  • Blog

Sectors

Sectors menu

  • Space
  • Aeronautics
  • Defense and Security
  • Intelligent Transportation Systems
  • Automotive
  • Cybersecurity
  • Digital Public Services
  • Healthcare
  • Industry
  • Financial
  • Services
  • Talent
  • About GMV
  • Shortcut to
    • Press Room
    • News
    • Events
    • Blog
    • Products A-Z
© 2025, GMV Innovating Solutions S.L.

Footer menu

  • Contact
  • Legal Notice
  • Privacy Policy
  • Cookie Policy

Footer Info

  • Commitment to the Environment
  • Financial Information