What can we do to help?

in-depth-icon insider-threat-icon-DIMnispom-icon-DIMintellectual-icon-DIMbehavioral-icon-DIMsecurity-icon-DIMcyber-forensics-icon-DIM

Insider Threat Program Management

Development of your Insider Threat program

Your organization’s interest to develop an Insider Threat program is a major step in the right direction and will pay huge dividends both in financial and personnel equity. It is important to understand that there is no “one size fits all” solution and it must be developed methodically and be tailored to achieve your expected results. Quortum will work closely with your leadership and stakeholders to help you build the program that best fits your organization’s needs.

Our Process

Quortum understands that not every program will start at the same place. Our CERT-Certified Insider Threat Vulnerability Assessment (LINK) is the best place to start, as it will provide an unbiased look at your current Insider Threat Risk posture.

Our scalable ITVA focuses on all employee-facing departments, most importantly:

  • Human Resources
  • Information Technology
  • Physical/Personnel Security
  • Legal/Ethics
  • Contracts (External Partnerships)
  • Product/Line Management
  • Risk Management

Once we work together to see where you are at, we discuss where you want to be, and develop a plan to achieve your goals. There are a variety of options for building your program, which typically includes:

  1. Start from the beginning and build the whole program
  2. Improve the pieces you already have:
    1. Policies and Procedures
    2. Defenses and Infrastructures
    3. Training
  3. Focus on a particular type of insider threat problem area, such as:
    1. Intellectual Property Theft
    2. IT Sabotage (Malicious and Unintentional Insiders)
    3. Personally Identifiable Information (IP) Loss
    4. Economic Espionage (Competitors and Foreign Entities)
  4. Do parallel development
    1. Implement pieces by priority
    2. Improve and Integrate what you have