Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Using Continuous Evaluation to Thwart Insider Threats

By Bob Liscouski
July 1, 2015

Before November 2009 little attention was paid to the silent threat cultivating inside of the U.S. Army. That all changed when a common U.S. Army officer, Major Nidal Hasan, killed 13 soldiers and injured 30 others during a shooting spree in the morning hours of November 5, 2009, at Fort Hood, Texas. The significance of insider threats has been reiterated with the shooting at the Washington, D.C., Navy Yard, and the intentional crashing of a Germanwings jet into the French Alps.

These events are significant in that they tragically ended in the death of innocent victims at the hands of those they placed trust in – fellow workers and service providers. In addition to the human cost, we must not lose track of the enormous cost associated with economic espionage, fraud and other deceptive behaviors that – through the appropriate use of technology and legal oversight – could have been detected and potentially prevented.

Most organizations believe that “insider threat” events are too rare to occur at small and medium-size businesses. The challenge is in understanding that over 70 percent of the losses are associated with events with an impact of less than $50,000, according to Computer World. The analytical risk model tells us that (Risk = Threat x Probability x Consequence). This is useful for analyzing a single event, but people are “continuous” and should therefore be evaluated continuously. As a result, the model should be (Risk = Threat x Probability x Consequence x Exposure x Employees). In this model, exposure is the factor associated with an event horizon that spans the average length of an employment period. While there are far more sophisticated models, the point is that organizations must consider the totality of events over time to derive the overall risk associated with insider threats.

In addition, organizations must understand the consequences in terms of physical damage, human loss, legal liability, revenue loss, brand reputation, etc. These factors are necessary to dispel the notion that insider threats are limited to big business and government concern only.

Once an organization understands its own risk profile, then the emergence of continuous evaluation tools that leverage big data analytics, case management, open source intelligence, social media, etc. can assist with managing insider threats. In the age of expanding surveillance capabilities, our ability to collect, analyze and correlate data gives us a tremendous capability to gain insight into events to prevent tragedies. While some argue the moral justification of that capability, others in the wake of a tragedy demand to know why efforts were not taken to prevent it. There is an old saying that with great knowledge comes great responsibility. Our capabilities must be balanced with the wisdom of knowing how to use that great power for good.

First, establishing policies that protect both employees and employers are critical. Understanding employment contracts and employment laws is necessary to ensure that information obtained from continuous evaluation is accurate, complete and sufficiently supports corporate decisions regarding an employee. Each organization must understand its risk profile and adopt role-based risk assessment engines that look at an employee in accordance to the risk profile associated with his or her specific function in the organization.

Typically, government agencies perform fitness evaluations that span 13 various areas of a person’s background: allegiance to the U.S., foreign influence, foreign preference, sexual behavior, personal conduct, financial consideration, alcohol consumption, drug involvement, emotional, mental and personality disorders, criminal conduct, outside activities and misuse of information technology. Certainly, many private companies would initially shy away from sensitive factors like sexual behavior and personality disorders. They should, however, look at the intent of these factors and adjust them accordingly. For example, while a small business may not be concerned about an employee selling national security secrets to other countries, they might be interested in corporate preference and the flow of sensitive corporate information to employees’ past firms.

Other challenges arise during continuous evaluation when a “hit” is discovered about an employee. It’s not uncommon for booking information to be coded incorrectly or incomplete from third-party criminal data providers. When this occurs, companies must apply rigorous processes and compliance checks to ensure that the data is accurate, complete and relevant. Then companies must consider what resulting actions can come from this data. If an employee’s continuous evaluation check reported that the employee had been booked for a felony crime, then that company must consider the ramification associated with that data. Terminating an employee for a charged offense without a conviction could result in legal liability, and it might draw the scrutiny of other employees.

As surveillance technologies converge, what is physically observed with analysis and judgment that aids decision making, transparency and oversight are key to making supportable and just decisions. Technology can empower an organization to be highly efficient and effectively run, or it can it highlight the management and organizational deficiencies that could create greater liabilities than they hope to prevent. The question isn’t whether organizations will adopt technologies that give them greater power, but will those organizations adopt the practices that enable them to use that power responsibly. 

KEYWORDS: employee screening insider threats security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bob Liscouski has more then 30 years of experience in security and law enforcement, and he is the Executive Vice President of Integrated Strategies Group. Liscouski and ISG have founded four additional firms — Steel City Re, Edge360, Axio Global and Convergent Risk Group.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Using Security Convergence to Enable the Enterprise

    See More
  • SEC0918-checks-feature-slide1_900px

    Reducing the Impact of Unmanaged Insider Risk Through Continuous Evaluation

    See More
  • How to Use Smarter Surveillance to Close Intelligence Gaps

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing