Insider Threat Checklist

Insider Threat Checklist

Despite what is reported in the news, many cyber incidents and cyberattacks are perpetrated by insiders, including employees, former employees, and contractors. Insider threats are particularly hard to guard against, especially when someone has legitimate access to your data. An insider threat program can help make organizations aware of the potential threats posed by insiders and mitigate potential incidents while digital forensics technology allows organizations to respond quickly, remotely and covertly when investigating employee wrongdoing.

This checklist will provide information on the essential elements of a complete insider threat program:

  • What data sources are needed to support an insider threat program;
  • Questions you need to ask about your insider threat awareness training program and how reporting and investigations are handled;
  • Policies, assessments and programs to help mitigate insider threatst.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.