About Us


Press Releases


Insider Threat

Public Speaking


Insider Threat

Program Training Course



Conforming Change 2 Training


Insider Threat

Risk Assessments


Insider Threat

Risk Mitigation Services


Insider Threat

Awareness Resources


National Insider Threat Special Interest Group


Cyber Security



Contact Us




Insider Threat Defense Is A Leader In Insider Threat Program Training / Insider Threat Risk Mitigation Services.

Client Listing

Client Comments





Insider Threat Defense

Trademark Notice

ITD TM Information



National Insider Threat Special Interest Group Insider Threat Symposium & Expo

(Free To Attend)

More Info






































































































joomla counter





Please Visit Our New Website For The Most Up To Date Information

Welcome To Insider Threat Defense

  • Insider Threat Defense has become the "Leader-Go To Company" for Insider Threat Program Development Training and Insider Threat Risk Management Services. We are a U.S. Based company and provide our services worldwide.


  • Insider Threat Defense provides a broad portfolio of training and services to potential clients, that will address "Insider Threat Risks" with a cost effective, comprehensive and holistic approach.


  • Insider Threat Defense has provided our training and services to 500+ organizations; U.S. Government Agencies (Department of Defense, Intelligence Community), Defense Contractors, NCMS Members / Chapters, Defense Security Service, Critical Infrastructure Providers, Aviation / Airline Industry, Spacecraft Manufacturing-Launch Providers, Technology Companies, Banking - Financial Industry, large and small businesses. Client Listing


Insider Threat Defense Offers The Following Training And Services

  • Insider Threat Program Development Training Course

  • Insider Threat Program Development Training Course For National Insider Threat Policy & NISPOM Conforming Change 2 (More Info)

  • Insider Threat Program Working Group Training Course

  • Employee Threat Identification And Mitigation Training Course

  • Cyber Threat - Insider Threat Workshop For CEO's And Board Of Directors  

  • Insider Threat Awareness Briefings / Training

  • Insider Threat Training Academy - Web Based Training (More Info)

  • Insider Threat Program Personnel Knowledge And Skills Assessment

  • Agent Surefire Insider Threat Investigation Game

  • Insider Threat Program Development & Guidance

  • Insider Threat Program Management Services

  • Insider Threat User Activity Monitoring Tools (Guidance / Implementation)

  • Insider Threat Risk Mitigation Services (Assessments / Mitigation Guidance)

  • Insider Threat Data Exflitration Testing

  • Employee Continuous Evaluation And Monitoring Service
    E-Mail Phishing Testing Service / Cyber Threat Awareness Training

  • For More Information Please See: Insider Threat Defense - Insider Threat Risk Management Training And Services Catalog


What Is An Insider? What Is The Insider Threat?
A broad definition of the Insider and Insider Threat follows.


An Insider is someone who has authorized access to an organization facilities,  data, information systems and networks. (Employee, Trusted Business Partner, Contractor or Maintenance Personnel)


Insider Threat Actions could intentionally or unintentionally compromise an organizations security, affect the confidentiality, integrity and availability of an organizations data, information systems and networks and degrade an organizations ability to accomplish its mission or business function, and also affect the safety of the organizations workforce.


Insider Threat Damages can include, but are not limited to, espionage, criminal enterprise, unauthorized disclosure of information (Sensitive Information, Intellectual Property, Trade Secrets), information technology sabotage, violation of federal or state laws, or any other activity resulting in the loss or degradation of an organization resources or capabilities.


Department of Defense (DoD) Definition Of Insider Threat
: Anyone who has authorized access to DoD resources by virtue of employment, volunteer activities, or contractual relationship with DoD.


Insider Threat: A person with authorized access, who uses that access, wittingly or unwittingly, to harm national security interests or national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions resulting in loss or degradation of resources or capabilities.

Insider Threat Damages
The Insider Threat has affected the U.S. Government, Department of Defense, Intelligence Community Agencies and many businesses.


Insider Threats To The U.S. Government, DoD, IC
The Insider Threat is a very real and serious problem. Damages by Insiders to U.S. National Security have been severe (WikiLeaks, NSA Classified Data Breach And Many Other Espionage Cases).


Threats To Businesses
The Insider Threat is not just a U.S. Government problem. There have been countless reports of the Insider Threat problem in the private sector and the severe damages that have been caused. The damages from an Insider sabotaging information technology systems or committing theft of an organizations sensitive information, intellectual property, trade secrets, or committing fraud can be very damaging and costly.


A 2014 FBI and Department of Homeland Security Alert reported there has been an increase in computer network exploitation and disruption by disgruntled and /or former employees. The FBI and DHS assess that disgruntled and former employees pose a significant cyber threat to U.S. businesses due to their authorized access to sensitive information and the networks businesses rely on. Companies victimized by current or former employees incur costs from $5,000 to $3 million.




The 2014 U.S. State Of Cyber Crime Survey stated: The incidents that typically fly under the media radar are insider events. We found that 28% of respondents pointed the finger at insiders, which includes trusted parties such as current and former employees, service providers, and contractors. Almost one-third (32%) say insider crimes are more costly or damaging than incidents perpetrated by outsiders. The larger the business, the more likely it is to consider insiders a threat; larger businesses also are more likely to recognize that insider incidents can be more costly and damaging. Despite this, however, only 49% of all respondents have a plan for responding to insider threats.


A 2014 Occupational Fraud and Abuse Report by the Association Of Certified Fraud Examiners (ACFE) stated; Companies lose 5 percent of revenue each year to fraud, which amounts to nearly $3.7 trillion globally. The report pegged the median loss from fraud at $145,000. More than 1 in 5 of the almost 1,500 cases analyzed in more than 100 countries had employees walking away with at least $1 million.  


The damages caused to businesses by Insiders Threats each year are not only substantial, but also on the rise. According to a recent RSA presentation that cited open-source, data-breach reports, and data-loss surveys gathered over a recent ten-year period, “The average cost per incident is $412,000, and the average loss per industry is $15 million over ten years. In several instances, damages reached more than $1 billion.”


Numerous other reports highlight the concern by the U.S. Government and businesses with regards to the Insider Threat. See: Insider Threat Timeline


The National Insider Threat Special Interest Group (NITSIG) is one of the largest groups of Insider Threat Risk Mitigation Experts. The NITSIG has complied some "Eye Opening" reports, surveys and incidents related to the insider threat problem.

Could your organization recover from the costs and damages from an Insider Threat Incident? Insider Threats Incidents-Could They Happen To Your Organization?


Insider Threats Made Easy
Why are organizations so vulnerable to the Insider Threat?

  • Insiders have already obtained a badge to access significant portions of an organization’s facilities, and a login and password to access significant amounts of an organizations data. Insiders also know what data in an organization has the most value.

  • Insiders attempting to commit a malicious action against the government or businesses will in most cases exploit an organizations weakest links that give them the greatest chance of success, without being caught.

  • Insiders in most cases know what is checked and not checked, and know when they won't be checked or challenged. Malicious Insiders are basically using the same methodology to get at the organizations data as the Malicious Outsider. The Outsider looks for a weak link or hole in the network perimeter, many times an Insider. The Insider looks for security weaknesses and exflitrates or steals the data any way they can.


Insider Threats - A Growing Problem
Current and past reports show that the continued Insider Threat problem stems from;  

  • A lack of security control implementation.

  • Weak or absence security awareness training and education.

  • A security culture where security polices are non-existence or not enforced.

  • Organizations that are just using technology to detect Malicious Insiders. Reports have shown that just trying to use technology to detect and mitigate Insider Threats, will provide the organization with a false sense of security. The best Data Loss Prevention Tool, Intrusion Detection System and Firewall may be useless in protecting an enterprise from the Insider Threat, as they are only part of the defense-in-depth security strategies required to mitigate the Insider Threat.

  • Per a 2013 Intelligence And National Security Alliance Report; Many private sector Insider Threat Programs are only technology-focused, centered on tools that monitor network traffic and online activity, only monitoring specific people that exhibit suspicious online behavior.

  • The Insider is a person. Therefore, organizations must identify psychosocial events and actions—anomalous, suspicious, or concerning nontechnical behaviors. A robust Insider Threat Program integrates and analyzes technical and nontechnical indicators to provide a holistic view of an organization’s Insider Threat risk from individuals identified as potential threats.

  • To reduce the risks from Insider Threats requires takes a combination of people, processes, awareness, training, technology and security controls to detect, deter and mitigate insider threat risks.


Insider Threat Program - Insider Threat Risk Mitigation Training Course


Combating The Insider Threat Risk Using An Enterprise Approach
For an organization to combat (Detect, Mitigate, Prevent) the Insider Threat, it needs to establish a comprehensive and integrated Insider Threat Program that is comprised of individuals from various departments, business units and supporting functions. Because each organization is unique, the structure of the Insider Threat Program may be different. The end result for any Insider Threat Program is the identification of suspicious or malicious activities and behavioral indicators by the Insider, as these are crucial in limiting or neutralizing the potential damage that may be caused by an Insider.


Whether you’re a U.S. Government Agency or private sector organization, Insider Threat Defense can help.

  • We can train your employees responsible for protecting your assets from the Insider Threat.

  • We will provide your employees with the knowledge and resources (From Basic To Advanced) to develop, implement, manage or support an Insider Threat Program for your organization.

  • We will assist your organization with developing, implementing or managing your Insider Threat Program.

  • We will conduct Insider Threat Risk Assessments of your organization.

Click Here For Information On:
Insider Threat Program Training Course


To All The Men And Women Of The Armed Forces

Thank You For All Your Efforts And Sacrifices






  Copyright © 2014- INSIDER THREAT DEFENSE - All Rights Reserved - Legal Notice