Search
Contact Us

Insider Threat Program Strategy

Keep up with the changing nature of employee and contractor risk within
your agency

Insider threat program improvements needed

Insider threats are often discovered only after the fact. Predicting risks, especially from malicious attacks, is critical to insider threat program success. Yet malicious incidents persist, representing 37% of all insider threat events.1 Agencies can bolster insider threat programs with new data to identity potentially malicious risks before they occur.

37% of insider threat incidents represent malicious attacks

Identifying and Reducing Insider Risk

Chris Cummiskey, Former Acting Undersecretary for Management at DHS, discusses how to recognize insider threats.

Smarter insider threat programs

Completely preventing insider threats is virtually impossible.
However, with a strong insider threat program, reducing risk can be accomplished.

Insider Threat Venn Diagram

To implement a complete insider threat program, agencies should adopt a data collection and monitoring framework that includes the following:

Organizational Processes
Helps detect suspect attitudes and behaviors

  • Culture
  • Performance reviews
  • Analytics
  • Workflows

Internal information
Helps identity suspect use of internal data and resources

  • Cybersecurity controls
  • Activity monitoring
  • Internet traffic
  • Data loss

External information
Helps uncover at-risk individuals and suspect associations

  • Traditional credit
  • Alternative financial
  • Public records
  • PAEI
  • Device intelligence

Using this framework enables agencies and contractors to better identify insiders who should be considered for threat evaluation and investigation.

Enhance Insider Threat Programs
With Comprehensive Data

Get an in-depth look into insider threats
and how to improve protection
for your organization and employees

Related Insights

Format

  • Load More
Contact us

* Required field