Insider Threat Matrix™Insider Threat Matrix™
PR027.001

Deepfake or Synthetic Identity Use in Hiring - AR3

Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection PR027.001
PR003.012

Installation of Dark Web-Capable Browsers - AR3

Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection PR003.012
IF009.007

Installation of Unapproved Browser Extensions - AR4

Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection IF009.007
PR027.005

Service Desk Impersonation for Credential Manipulation - AR3

Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection PR027.005
AF029.001

Browser or System Proxy Configuration - AR5

Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection AF029.001
PR018.008

Bypassing Network Segmentation - AR3

Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection PR018.008
ME027.004

Unmanaged Credential Storage - AR2

Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Subsection ME027.004
PV074

Network Segmentation - PV074

Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Prevention PV074
PV075

Centralized Asset Inventory Control - PV075

Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Prevention PV075
PV076

Account Inventory and Ownership Validation - PV076

Contributor: David Larsen @ Principal IT Auditor, CERT ITPM - Prevention PV076