Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ServicesEnterprise Services

Reducing the Impact of Unmanaged Insider Risk Through Continuous Evaluation

Workforce risk is continuously changing, so why rely on pre-employment background checks alone?

By Steve Izurieta
SEC0918-checks-feature-slide1_900px
SEC0918-checks-slide2_900px
SEC0918-checks-slide3_900px
SEC0918-checks-slide4_900px
SEC0918-checks-feature-slide1_900px
SEC0918-checks-slide2_900px
SEC0918-checks-slide3_900px
SEC0918-checks-slide4_900px
September 7, 2018

Every day in businesses across industries, there are myriad negative events occurring within a company’s workforce, which can include full-time employees to part-time staff and contractors. These events can range from absenteeism, performance issues and complaints from peers to cybersecurity infractions, control access violations and physical crime. Often, these events are benign and have little impact on the company. But, in other cases, they are highly detrimental and can result in many millions of dollars in losses. They can go against the company’s policies or even against the law. But, one thing is usually common across all of these events. Typically, the company finds out about the unmanaged risks ONLY after an event has occurred. By then, the unfortunate damage is done.

The ability to proactively evaluate, diagnose and mitigate workforce risk by knowing and understanding all risk factors is critical. Companies must move from a reactive to a proactive workforce risk management approach. The days where risk management is only associated with IT and financial monitoring are over. Leaders now know it takes a C-level focus across the entire enterprise including security, compliance, technology and human resources to truly address workforce risk.

 

Unmanaged Workforce Risk is Bad Business

Workforce risk lacks attention even though it is associated with the most expensive and vital asset at any company: the employees. Knowing the risks that employees can pose is critical for CSOs, CROs and other executives looking to implement comprehensive risk management and mitigation programs. These programs are a key to any company’s ultimate security and revenue assurance.

The business impact of an unmanaged workforce risk is significant. The average U.S. company loses approximately five percent of its annual revenue to white collar crime committed by its own employees. And, those risks increase by level of employee. Median business losses caused by executives are 16 times those of their employees. And, the average loss caused by managers is four-times those caused by employees. Organizations have an obligation to manage workforce risk. They need to ensure the safety of employees and customers, while protecting their brand and reputation. Companies need to guarantee financial well-being and comply with federal and state regulations.

 

The Answer is Continuous Evaluation

How do organizations manage this risk today? Background checks are commonly used prior to onboarding employees. Occasionally background screens are conducted periodically afterwards. These static snapshots do not address the dynamic risk presented by a workforce, especially as mobile and digital blends work and life.

The monitoring of device and network access is also commonly utilized to evaluate workforce risk. While the importance of strong cybersecurity protections cannot be underestimated, there are proactive insights that can be gained by broadening security’s focus. The monitoring of device and network activity only demonstrates already existing internal issues or abnormalities. This will not provide insights into potential risks to an organization which are driven by an individual’s actions outside of work. Understanding holistic workforce risk, inside and outside the company, is required to reduce the impact of insider risks.

Continuous evaluation helps organizations understand the risk of their workforce. This enables them to take the most appropriate mitigation steps based on corporate policy and business regulations.

Continuous evaluation is the proactive, accurate and actionable assessment of risk causing events in a workforce which are business-relevant and privacy-centric. Continuous alerting of such events shifts an organization from reactive responses to proactive mitigations. This benefits both the organization and the individuals within the workforce. Learning about major risk events as they are actively occurring enables an organization to see potential risks as they build, while there is still time to intercede with employee assistance prior to any negative impacts.

The need for accurate, complete and actionable insights is obvious, just not easy to accomplish. Acquiring and aligning accurate, complete external events to the correct employee identity, on a continuous basis, requires sophisticated data integration, event categorization and identity matching capabilities. Many organizations attempt to manage workforce risk with raw or simple data feeds, which shower them with substantial amounts of data. But this does not support accuracy or completeness, causing significant false positives and false negative events.  Having to investigate false positive events wastes time and money. Missing events – false negative events – defeats the purpose of having continuous evaluation. Without accuracy and completeness, the company cannot have actionable insights to reduce workforce risks.

Business-relevant and privacy-centric insights go hand in hand. Different companies and even different employees within a company may have different risks. Having insights on the types of risks that are relevant to your business and to the specific roles within your business, enables the efficient management of risks. Being fed any type of external event data for an employee, regardless of business or role relevance, not only creates needless noise and costs, but also creates employee privacy issues.

 

No Company is Immune

Many companies take a “it will never happen here” mindset to insider threats because they believe they hire the best, most honest and trusted employees. While they may have initially hired “the best” employee who had a bulletproof background screening years ago, there can be many stress factors in an individual’s life which occur post-hire. Those stressors can include a difficult divorce, a DUI or assault charge or some other type of arrest, a bankruptcy or lien – the list is endless. Most of the time, these stressors are external and out of sight of the employer. However, in some cases, these stressors can lead to or exasperate motives and pressures which cause events internally at the organization. Gone are the days where executives can say “we did not know” an employee was a risk or harm. Consumers, clients, regulators and the company’s own employees expect the company to apply the same level of rigor they use to evaluate the risk on other critical assets to evaluate their most important asset – their workforce.

Misinformed and unschooled executive teams believe that evaluating their workforce’s risks would negatively impact their company culture. Quite the opposite is true. The majority of any workforce are hardworking, dedicated individuals who have a vested interest in the success of the company. The understanding that a company wants to ensure everyone else around that dedicated individual is working for their best interests is reassuring.

Knowing the critical components to enable the effective and efficient continuous evaluation of workforce risk, the final question is: what tools are needed to acquire success? As mentioned previously, many companies believe continuous evaluation can be achieved with simple refreshed data feeds. This provides reams of data but will not create actionable and relevant insights. To mitigate risks before they impact the business, I recommend the utilization of a purpose-built platform that performs heavy cognitive actions on the back end. These include:

  • Algorithms for standardizing records, categorizing events and matching identity automatically;
  • Notifications and alerts of significant events delivered through an easily accessible portal so that risks can be quickly identified;
  • Enabling proactive policy enforcement and ensuring that employee assistance programs (EAPs) are effectively used and risks are mitigated before they impact the business; and
  • Generating customized reports on the entire workforce or on specific populations to help employers with a macro-level understanding of their risks.

If your company is ready to evaluate the risk profile of your most expensive and vital asset, you should ask yourself a few questions: Do you have a solution to truly evaluate that risk and not just at certain points of time and with internal data assets? Can you continuously monitor employees with a holistic view of the workforce risk? Don’t fall for the frequent misconception that continuous evaluation is the continual application of a background check. The corporate ecosystem is littered with companies that made that very costly mistake.

KEYWORDS: background check employee risk enterprise risk management insider threats

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sec0918 checks slide4 900px 1

Steve Izurieta is a contributing writer and the Chief Operating Officer at Endera. He has more than two decades of experience focused on launching innovative products, within both public and growth stage technology companies, to generate initial and additive revenue streams and to create profitable enterprises.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Using Continuous Evaluation to Thwart Insider Threats

    See More
  • Complying with California's Workplace Violence Prevention in Healthcare Rule

    Continuous Evaluation Is the Key to Preventing Workplace Violence

    See More
  • criminal records

    Continuous Evaluation Supports and Fosters Second Chances for Those Formerly Incarcerated

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing