Insider Threats: Protecting Against the Enemy Within

By implementing a comprehensive program that includes the entirety of the organization, unified security teams not only minimize the insider attack risk, but also promote a strong, honest and collaborative workspace. 

This site is protected by reCAPTCHA and the Google
Privacy Policy and Terms of Service apply.


This checklist will help you determine the effectiveness of your insider threat awareness processes in three categories:

Pre-Employment Screening

Conducting a thorough background check and collecting supporting materials may be your greatest means of defense

Post-Contract Considerations

Establish a strong reporting culture in your organization with a focus on insider threat awareness and training

Post-Employment Termination

Determine what resources are in place for continuous monitoring of former employees or business partners that pose a legitimate threat