Identifying common personality characteristics, precipitating events, and indicators for insider types.
View/Download
A CIA Operations Officer on Today’s Insider Risk Challenge
Insiders. How we can define their personalities, critical events, potential indicators, and attack progression.
New perspectives, policies and perspectives needed.
View / Download
Malicious actors think and act differently. So should you.
View / Download
Used properly, advanced technology empowers next generation risk management.
View / Download
Ubiquitous digital surveillance and powerful data analytics are changing espionage in ways that we’re only starting to understand.
View / Download
Emotions, finances, and politics have long been traditional motivators for malicious insiders.
View / Download
Layoffs and terminations are often a trigger for negative actions.
View / Download
Data breaches help foreign adversaries recruit insider sources from government agencies, businesses, and universities.
View / Download
Corporate mergers and acquisitions (M&A) create significant security risks and vulnerabilities for both the buyer and seller.
View / Download
Large-scale thefts of personal data threaten American government agencies and private companies that hold sensitive information of value to hostile nations.
View / Download
Indicators of insider risk are increasingly reflected in publicly available spaces.
View / Download
A Whole Threat and Whole Person Approach to Effective Insider Threat Warning
View / Download