MYSEC.TV

Home   /   RESOURCES   /   MYSEC.TV   / Insider Threats and Corporate Data exfiltration

Insider Threats and Corporate Data exfiltration

Tech & Sec Weekly
SHARE:

IN THIS VIDEO

Jane Lo, Singapore Correspondent speaks with Dagmawi Mulugeta, Threat researcher with Netskope Threat Labs.

Dagmawi has his OSCP and has previously worked at Cyrisk (a subsidiary of 4A Security), Sift Security (acquired by Netskope), and ECFMG as a researcher, security engineer, and developer. He has innate interests in public CTFs, exploit development, and abuse of cloud apps.

He has his MSc in Cybersecurity from Drexel University. In this interview, Dagmawi shared the behavioural insights found for employees preparing to leave, and how these indicators could enable organizations to protect their data more effectively.

He noted the concern that many organisations have with “flight risk” users – that is, employees that are getting ready to leave – taking corporate data with them. A common question to address this concern, is how to efficiently identify such risks – without sifting through hundreds of alerts and spending hundreds of man-hours.

Dagmawi shared how they approached this problem by analysing anonymized data of over 4 million users from more than 200 different organizations worldwide., and some interesting key revelations:

(i) 15% of leavers used personal cloud apps (e.g. Google drive, Gmail) to take data with them
(ii) 2% were violating corporate policy (exfiltrating sensitive corporate information)
(iii) majority of the data movement happens 50 days before leaving. Dagmawi highlighted how they identified three key signals to filter out alerts with potential flight risks:
a) volume – identifying whether the data being moved is anomalous for the individual in the organisation
b) nature of data – whether the data being moved is sensitive
c) direction – whether the cloud application is outside of the organisation’s management (e.g. google drive).

Wrapping up, Dagmawi recommended that encoding the three signals into the detection systems could help reduce the size for reviews by 43x – that is, for every 50 alerts, the signals could help to filter out the 1 or 2 concerning ones.

Recorded 11th May 2023, 3.30pm, Black Hat Asia 2023, Singapore Marina Bay Sands.

#bhasia #mysecuritytv #insiderthreat

OTHER VIDEOS IN THIS SERIES

techsec-01
November 28, 2025
We cross to Orlando, Florida and speak with Yuriy Tsibere, Product Manager at ThreatLocker. We dive into the ThreatLocker DAC dashboard, built right into the ThreatLocker agent.Watch Now
sp12
November 17, 2025
We speak again with Jonathan Hung, Executive Director of the Office for Space Technology & Industry in Singapore, who outlines recent developments and future plans for OSTIn initiatives.Watch Now
mm32
November 13, 2025
Zoe Thompson, Head of Critical Infrastructure Protection at Thales Cyber Security, shares insights into how Thales is strengthening cybersecurity across Australia’s vital sectors — including energy, water, and telecommunications.Watch Now
mm23
November 13, 2025
Nick de Bont, Chief Security Officer at Thales, shares his perspective on safeguarding Australia and New Zealand’s critical infrastructure — from strategic defense sites to high-security manufacturing facilities.Watch Now