Insider Threat Programs: A Beginner’s Guide

What your company spent years to develop can be lost in an instant at the hands of one bad intentioned employee. The statistics on employee theft of intellectual property (IP) paint a dark portrait of what employees do when disgruntled, moving on, or stockpiling for a rainy day. William Evanina, the U.S. government’s National Counterintelligence Executive in the Office of the Director of National Intelligence says, “As a corporate leader, the single most important investment in protecting your proprietary information and sensitive trade secrets is developing a viable and enterprise-wide insider threat program”.

No matter where your company is along its journey toward an effective insider threat program, success or failure is measured by the last harmful egress of research, formulas, algorithms,  strategies, service manuals, or other critical business information (CBI). Whether your effort to detect, deter, and prevent CBI loss has become an industry model or is still a nascent vision, three common components can help build a new plan or help improve a mature program.

Read how you can develop a great insider threat program by answering the questions “What is it that most merits protection?”, “Where is this most critical information located?” and “Who amongst us requires regular access to CBI?”, on Security Magazine.

Track the strategic threats to your business with the Threat Brief, delivered to your email daily.

Subscribe Here