A board of directors plays a critical role in shaping a company’s strategy, maintaining relationships with shareholders, and safeguarding the company’s reputation. Appointing a new director may bring welcome...
Chloe Silvester , Head of General Practice, Practical Guidance Stephen Tuck , Legal Writer, Practical Guidance Personal Injury Victoria Ben Newling , Legal Writer, Practical Guidance Personal Injury NSW...
Jennifer Raphael , Senior Legal Writer, Practical Guidance Construction, LexisNexis ® In 2024, several pivotal decisions were made across New South Wales, Victoria, and Queensland concerning Security...
Jennifer Raphael , Senior Legal Writer, Practical Guidance Construction, LexisNexis ® In the ever-evolving landscape of construction law, 2025 promises to be a pivotal year for legal practitioners...
Jada Lam , Practical Guidance Legal Writer – Employment and WHS The Fair Work Act 2009 has been updated with the 'Employee Choice Pathway,' offering new rights for casual employees. Read on for essential...
We are living in a very complex world filled with vulnerability and uncertainty, where anyone, externally or internally, can cause harm to you and your organisation. When a person with authorised access to organisational resources becomes an adversary, they are deemed an “insider threat”, which refers to an insider who wittingly or unwittingly does harm to the organisation. Examples are sabotage, espionage, terrorism and unauthorised disclosure of information. Insider threats may be caused by negligence or criminal acts.
Implementing an Insider Threat Program
One way in which to mitigate the risk of insider threats is to implement an Insider Threat Program, but before doing so, a proper risk assessment of the organisation should be carried out to identify the critical assets and the effect of an adversary attack on each asset.
Risk assessment
Various activities like the behaviour of individual employees, system login/logoff, restart/shutdown, search history, print history, site access log, use of removable data storage devices and so on may be monitored to identify the threats. Security and HR Departments can play vital roles in extracting data on employee behaviour. Most insider threat actors exhibit risky behaviour prior to committing any adverse action. If such behaviour is identified earlier, we can avoid or mitigate many risks.
Benefits of an Insider Threat Program
The Insider Threat Program should be able to identify and collect inputs on threats and all data should be verified. All data received should be monitored and analysed for further action. This data integration may be done automatically or manually. In an automatic system, all data will be fed automatically and evaluated further. Whereas in manual mode data is to be fed manually. The stored data could be analysed by a human being or machine/software. Reporting of the same could be done in real-time which is a proactive solution, or event-triggered which is a reactive solution — here information should be reviewed and collected only when a certain condition is met.
Ongoing commitment
All employees should be given insider threat awareness training, which will help them identify various methodologies used by adversaries to extract data from them. Employees should be trained on what to report and how to report.
In short
The best formula to handle insider threat is: Avoid - Detect - Mitigate - Review.
We may avoid it by proper training on insider threat awareness. A proper team and policies/procedures may be implemented to detect insider threat. It may be mitigated through various countermeasures. All these actions should be reviewed periodically and updated as per the requirement.
“Prevention is better than cure” hence always watch your surroundings for any indications and take necessary measures to deter/mitigate the risk of insider threat.
![]() |
ABOUT THE AUTHOR Bibin K Rbibinkr@gmail.com Bibin K R is a military veteran having 16 + years of hands-on experience in Security Management, Physical Security and Risk Assessment. He is Board Certified in Security Management and a Certified Protection Professional (CPP) from ASIS International, USA. He has experience in various sectors of the industry ranging from Defence, Entertainment, Facility/Real Estate, Education and Construction. |
This article appears in a recent edition of Risk Management Today. Subscribers may view the full article from Risk Management Today - HERE.
Risk Management Today is a LexisNexis newsletter that provides commentary and summaries of new legislation, recent research studies and surveys from around the world on areas that impact corporate risk. Topics include security, fraud prevention, OH&S, strategy and contingency planning, corporate governance, compliance and liability, crisis management and business continuity and sustainability.
TO SUBSCRIBE TO RISK MANAGEMENT TODAY, CONTACT US BELOW.