Companies should prioritize monitoring retained access to prevent security breaches as employees move within or depart the organization, as seen in the case of the Proofpoint lawsuits involving intellectual property theft. Collaborating with human resources, finance, and IT is essential, and processes must be in place for onboarding, offboarding, and managing access clearance. Ensuring transparency and removing access promptly post-employment play a critical role in mitigating insider risks

Monitor retained access to avoid risks

The concept of 'need-to-know' and least privileged access should be fundamental, as illustrated by the case of the US Department of Energy where thousands of separated contractors retained access to nuclear research facilities. Coordination between HR and information security is crucial to avoid such incidents, urging CISOs to take proactive measures to close the barn door in time. ```
https://www.csoonline.com/article/2095857/close-the-barn-door-now-avoid-the-risk-of-not-monitoring-retained-access-before-its-a-problem.html