Field-Tested Proactive Insider Threat Program


Over 90% of most companies’ value now comes from intangible assets1. In addition to Intellectual Property (IP), brand reputation, competitive advantage, supplier network, employee retention, and customer loyalty are measurably affected by cyberattacks2. Research3 shows some of the most damaging losses coming from trusted insiders with malicious intent, also called Insider Threat. 

 The biggest gains come from proactive attention to Insider Threat, that is, don’t chase after the horse that’s gotten away, keep it from leaving the stable.

 Addressing Insider Threat requires close coordination among cybersecurity, Human Resources (HR), Legal, Information Technology (IT), Ethics & Compliance, and Physical Security. It requires the cooperation of multiple CxOs and is a matter of concern to the Board of Directors.

 Lean into our 9 years of experience creating, maturing and sustaining a proactive program covering 15,000 employees at 150 global locations to pave the way for a field-tested solution tailored to your organization.


What are Insider Threat events?

There are 9 major categories of events that an effective Insider Threat Program addresses:

  • IT Sabotage
  • IT Asset Misuse
  • Accidental Data Leak
  • Opportunistic Data Theft
  • Espionage
  • Financial Fraud
  • Physical Theft
  • Product Alteration
  • Workplace Violence

Insider Threat requires a new approach

Traditional cybersecurity controls are key as external cyber threats continue to evolve in complexity and persistence. However, these foundational technical and procedural controls alone do not address Insider Threats. 


What is an Insider Threat Program?

A global, centrally managed group with established protocols integrate cross-functional risk indicators to proactively mitigate Insider Threats.  Typically, there are behavioral precursors which leave a digital trail; the program seeks to centralize this information for proactive, not reactive, risk mitigation.

An effective, proactive program collects, analyzes, reports and responds quickly.  It also closely coordinates with key stakeholders such as Human Resources, Legal, Cybersecurity, Ethics & Compliance, and Physical Security teams.


What are the key areas to address?

The foundational components of a proactive Insider Threat Program are: governance, team member training & awareness, detection & reporting, reviews & response, and continuous improvement.

    Why Securithink?

    • 9 years of experience creating, maturing and sustaining a proactive Fortune 500 Insider Threat program covering 15,000 employees at 150 global locations
    • 50+ years combined experience on Fortune 500 mission critical projects requiring both tech skills and business savvy
    • 30+ years combined experience creating the technology business case for owners, Boards of Directors, and CxOs
    • 35+ years combined experience in cybersecurity and network engineering
    • 12 years Fortune 500 CISO experience
    • Pro-active stakeholder engagement – from front line team to senior leadership and owners – means low organizational noise and rapid implementation once support is aligned
    • Fortune 100 experience included smaller operational units so it scales to medium-size businesses
    • Nationally recognized experts accustomed to working globally

    Want more?

    • SecuriThink says we think we know what done looks like, which includes a good, proactive Insider Threat program. That’s admittedly a nervy claim. Are you curious “How we know what done looks like”?
    • Contact us to explore if SecuriThink Field-Tested Insider Threat solution is the right start to accelerate a program tailored to your organization.

    What Else We Do

    Step Zero™ Rapid Cybersecurity Cost Estimates

    Step Zero™ Rapid Cybersecurity Cost Estimates

    This unique approach, with a known range of verified accuracy, was first field-tested on 12 Fortune 500 Merger and Acquisition (M&A) deals yet it also supports data-driven investment decisions for cybersecurity compliance.

    read more
    Managing Up and Out™ Security Strategy and Education

    Managing Up and Out™ Security Strategy and Education

    Tap the 30+ years combined experience of our team to align stakeholders from Boards of Directors and C-suite to critical asset owners or front-line team members. Whether it’s a business case, strategy roadmap, or key presentation, we can cross-train, ghostwrite, or deliver on your behalf.

    read more
    CMMC Readiness

    CMMC Readiness

    Cybersecurity Maturity Model Certification (CMMC) is the evolution of cybersecurity contractual requirements from the Department of Defense (DoD) with which SecuriThink practitioners have been involved for over 10 years.

    Our journey satisfying these requirements is the story of “how we know what done looks like” for cybersecurity as we state on our website homepage.

    read more
    SecuriThink Field-Tested Data Classification Solution

    SecuriThink Field-Tested Data Classification Solution

    Get higher returns on your project investment with a field-tested data classification solution based on two Fortune 500 projects involving 12,000 and 50,000 team members, respectively.

    Our Data Classification Solution integrates technology with business transformation methods to manage factors too often left out of a security project. We leverage what’s already going well in your organization, while shifting to higher potential.

    read more
    SecuriThink Field-Tested OT / IT Integration

    SecuriThink Field-Tested OT / IT Integration

    Readily create dollars from Operational Technology (OT) data using our field-tested approach to Information Technology (IT) integration based on success at 42 facilities across 15 different business divisions

    read more
    Cultural Armour™

    Cultural Armour™

    Optimizing your company’s information security
    Takes more than the latest technology
    Or a staff trained to use it.
    It takes a shift in thinking.
    A shift in acting.

    read more
    Supply Chain Cybersecurity

    Supply Chain Cybersecurity

    Threat actors are increasingly exploiting the path of least resistance in the supply chain to attack their real targets. While more large companies have built a reasonable cybersecurity posture, malicious actors still find easy ingress through abundant open doors in smaller suppliers.

    Supply chain attacks have skyrocketed to the point where targeted companies are motivated to manage their own risk by managing the risk hiding in their supply chain.

    read more