APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • AI
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Artificial Intelligence
    Editor's Pick (1 - 4 of 8)
    left
    The Right Technology And Reliable Partners; The Business Next Frontier

    Luke O'Brien, CIO, ISS Facility Services Australia & New Zealand

    Conquering Technological Transformation

    David Kennedy, Group CIO, Transaction Services Group

    How to Get to AI-first

    Ani Paul, CIO, ING Australia

    Legal Knowledge Management and the Rise of Artificial Intelligence

    Christopher Zegers, CIO, Lowenstein Sandler LLP

    Building an AI-Based Machine Learning for Global Economics

    Alexander Fleiss, CIO & CEO, Rebellion Research Partners LP

    Harnessing AI to Optimize Manufacturing and Logistics

    Anton Setiawan, General Manager, Information Technology, PT Panca Budi Idaman TBK (IDX:PBID)

    Building Agile, Secure and Human-Centered IT at Globe

    Raul Macatangay, Chief Information Officer, Globe Telecom

    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    Phiphat Khanonwet, Head of IT, Onyx Hospitality Group

    right

    Insider Threat

    Luca Fioravanti, Senior Vice President,Group Head of Corporate Security and Resilience, UniCredit

    Tweet
    content-image

    Luca Fioravanti, Senior Vice President,Group Head of Corporate Security and Resilience, UniCredit

    The new working environments have dramatically changed compared to what they were just few years ago. The fast development of new communication technologies, the need for organisation to expand their business in new markets to remain competitive and generate profits for their shareholders, and the need for organisations to attract talents globally, introduced new challenges. Those challenges have further increased from the post COVID-19 pandemic, with employees all around the world preferring the remote working to the traditional workplace.

    As result the attack surface has extended and organization and the insider threat is a raising issue.

    In addition, the recent conflict between Russia and Ukraine has seen an increase of nation state sponsored attacks, not only using criminal organizations, offering hacking tools as a services, but also leveraging on insiders.

    Large organisations, in all industry sectors, nowadays have access to an unprecedent amount of data, which often is the most valuable company’s asset. To be effective and efficient in their business propositions, organisations extensively use third parties, which are now considered strategic partners, and more often offshore offices and processes, to exploit labour arbitrage, in developing countries.

    The insider threat is an emerging issue and it comes under many forms, such as data breaches, fraud, sabotage and even terrorist attacks, employees and more in general every authorised individual with access right to a company’s resource can create enormous dam-ages in term of financial losses, service interruption, reputational damage and even physical harm to the workforce.

    Nowadays, with the evolution of advanced data analytics, artificial intelligence, machine learning and big data, sophisticated mathematical models can be developed to identify and monitor employees’ behaviours to identify anomaly patterns that could represent a threat for the organisation. However, organisations must be mindful of employees’ right to privacy, considering that the boundaries between personal life and work life are often blur and not well demarked.

    Mutual trust between employer and employees is the key to implement an effective and balanced secure environment, be transparent about the control environment and demonstrate a fair and balanced approach will lead the employees to follow and obey the security policies, while if the control environment is too oppressive the workforce may be distracted and distressed and leave in fear.

    To be effective and efficient in their business propositions, organisations extensively use third parties, which are now considered strategic partners, and more often offshore offices and processes, to exploit labour arbitrage, in developing countries

    The legal aspect is very critical for global organisations which want to implement and roll out employee monitoring programmes across all locations where they have employees or contractors accessing their network and utilising the company’s assets.

    Organisations must be aware that the legal considerations for employee monitoring will vary from organisation to organisation and specific issues will arise depending on the nature of the organisation undertaking monitoring and the risks it is trying to mitigate

    tag

    Big Data

    Financial

    Machine Learning

    Fraud

    Weekly Brief

    loading
    Top 20 Prominent Artificial Intelligence Solutions Providers in APAC - 2024
    ON THE DECK

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://artificial-intelligence.apacciooutlook.com/views/insider-threat-nwid-9360.html