Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New CISA Guidance Targets Insider Threat Risks
News

New CISA Guidance Targets Insider Threat Risks

Team-CWDBy Team-CWDJanuary 31, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The risk posed by insiders with authorized access to sensitive systems has prompted a renewed call to action from the US Cybersecurity and Infrastructure Security Agency (CISA).

The government entity has released a new infographic designed to help organizations prevent, detect and respond to insider threats that can disrupt operations and undermine trust.

The resource is aimed at critical infrastructure operators and state, local, tribal and territorial (SLTT) governments. It outlines practical steps for building teams that can manage insider risk in a structured and coordinated way, drawing on expertise across security, legal, human resources and operational functions.

Insider threats can emerge through deliberate acts or unintentional mistakes, CISA warned. Malicious insiders may abuse access for personal gain or retaliation, while negligent behavior and human error can create vulnerabilities that external adversaries exploit. In both cases, the impact can include data loss, reputational damage and harm to people or essential services.

“Insider threats remain one of the most serious challenges to organizational security because they can erode trust and disrupt critical operations,” said acting CISA director, Madhu Gottumukkala.

“CISA is committed to helping organizations confront this risk head-on by delivering practical strategies, expert guidance, and actionable resources that empower leaders to act decisively – building resilient, multi-disciplinary teams, fostering accountability and safeguarding the systems Americans rely on every day.”

A More Secure Framework

At the center of the infographic is a framework that treats insider threat management as an essential capability rather than an optional program. CISA emphasizes that teams should be scalable, trained and embedded within existing organizational structures to reflect risk tolerance and culture.

The key benefits highlighted include:

  • Broader visibility into risk factors through varied perspectives

  • Faster recognition of patterns during incidents

  • Improved resilience as organizations grow and change

Read more on insider threat mitigation: Insider Threats Surge: What CISOs Must Know to Protect Their Organizations

The guidance sets out a four-stage model: plan, organize, execute and maintain. This approach encourages organizations to define priorities, select appropriate team members and establish clear processes before incidents occur. It also stresses the need for confidentiality, legal compliance and coordination with external partners such as law enforcement.

“Insider threats can disrupt operations, compromise safety and cause reputational damage without warning,” said CISA executive assistant director for infrastructure security, Steve Casapulla.

“Organizations with mature insider threat programs are more resilient to disruptions, should they occur.”

CISA added that effective insider threat management depends on people as much as technology. By fostering a culture of reporting and trust, organizations can identify concerns early and reduce the likelihood that internal vulnerabilities turn into major security incidents.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
Next Article CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog
Team-CWD
  • Website

Related Posts

News

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026
News

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
News

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

When ‘hacking’ your game becomes a security risk

October 17, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.