Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Leadership and ManagementSecurity & Business ResilienceGovernment: Federal, State and Local

5 minutes with Stephanie Jaros: Identifying and addressing insider threats

By Layan Dahhan
5_minutes_with_Jaros_1121_900px.jpg
November 17, 2021

Stephanie Jaros, Director of Research for the U.S. Department of Defense’s (DoD) counter-insider threat program, talks to Security about her journey through security and her work with insider threats. She talks about the integration of the human and behavioral sciences into DoD’s program, the Threat Lab, as well as the importance of identifying and addressing insider threats — as well as the criticality of the timeline.

Security magazine: Could you tell me a bit about your journey into security and what led you to your current position in the field?


Jaros: The theme of my career I think is best summarized by, ‘I don't know where I'm going, but I always seem to get there.’ I had been studying sociology of sex and gender and I attended a career fair during graduate school for government employment. I was really interested in health and policy jobs, but we had all put our resumes into a resume bank so the people who attended the job fair could see them. One day, I got a call from a representative from U.S. Customs and Border Protection [CBP]. [The recruiter] had seen my resume, saw my research experience and invited me to interview at the career fair. You never want to turn down an opportunity to interview, to practice your skills, to meet new people, but I have to be honest: I did not know what CBP did. In fact, I mistook it for TSA, but I wasn’t about to tell her that on the phone.

I was able to begin my government career at a small research unit within CBP’s office of Internal Affairs that was dedicated to studying the pathway from an employee’s idea to their corrupt activity. At CBP, the corruption we were interested in studying and ultimately helping to prevent was misuse of position — particularly at the borders among agents or officers who would accept bribes or let in people, drugs, weapons, money, [and] things like that. Then in 2011, after Executive Order 13587 was signed, all government agencies had to have an insider threat program and CBP posted a job for an insider threat program coordinator.

I was excited to move into the insider threat space. Eventually, I moved to Northrop Grumman so I could work for the Defense Personnel and Security Research Center or PERSEREC. I started as a contractor and then moved back into government — which I had not expected to do — as a PERSEREC government civilian because I knew the job would be dedicated to the insider threat research portfolio. I had met DoD’s counter-insider threat program director, Dr. Brad Millick, and his then-Chief of Staff, Ms. Doris Gobin, and we had a fantastic discussion about their vision for DoD’s enterprise-level program: where they wanted it to go and how they wanted the social and behavioral sciences to be one of the foundations for their program. I responded to Dr. Millick’s statement [about building] this program, named it the Threat Lab, and I’ve been doing it ever since.

Security magazine: In your line of work, you specifically deal with insider threats. Could you tell me a bit about what insider threats are and how one might identify them?

Jaros: It really depends on where you sit — your type of agency, your type of organization — and how you define the phrase “insider threat.” In line with Executive Order 13587 that I mentioned, which was published in 2011 in response to the WikiLeaks case, government agencies had to create these programs to protect their classified assets. This meant that only people with eligibility for a national security clearance would be within the scope of these programs and the focus would mainly be on protecting our electronic assets from unauthorized removal and transmission. Over time, these programs — particularly in DoD and in some other agencies — [have] expanded, and the reason for that is because we have recognized the risks associated with losing our unclassified assets. We’ve also been reminded all too often of the harm that is caused by workplace violence incidents.

Today, [in 2021], we are working to create a more comprehensive counter-insider threat program that goes beyond detection to include both prevention and mitigation strategies, [while] also [fulfilling] our requirement to incorporate privacy and civil liberties protections for the workforce. This is really where our opportunity to integrate the social and behavioral sciences [comes] in, when we’re talking about prevention and mitigation, because as I mentioned when I got my job at CBP, we know that there are intervention points along a person’s pathway.

This critical pathway from idea to action, whether we’re talking about espionage, corruption, or even workplace violence — it’s not the same pathway but along the way, it could be described as such. Rather than wait for one of these high-impact, low-frequency events to occur, we want to work with people to understand their situations [and] help them return to being productive, healthy members of our workforce. That means that we want to take advantage of those intervention opportunities along the way.

Security magazine: Going back to identifying insider threats — are there levels of urgency when it comes to addressing certain threats?

Jaros: There’s certainly those situations in which there’s an immediate risk of harm to self or others — particularly in the threat of violence. Those you want to address right away, but I don’t quite think that’s what you’re asking. This idea of whether or not smaller concerns can lead to bigger problems; we’ve all seen the data about the financial cost of cybercrime and we know the cost in the private sector of stolen intellectual property. Insider threat professionals do have an opportunity to reduce these costs and mitigate these losses. Whenever I see another workplace shooting, I am reminded of just how important our work is.

We know from our research that people rarely join an organization with the intent to do harm — the cases do happen, but they are rare. Instead, individual and environmental factors contribute to their decision to carry out harm. We know that there are known or knowable behaviors that happen along the way, so [I believe] it is our responsibility to build programs, help people and organizations recognize report, and respond to the concerning behaviors that precede these events before they can turn into something that has such a high impact [or] a long recovery time. It’s important to prioritize, but it [is] also extremely important to put resources toward early mitigation and prevention.

Security magazine: What do you think makes for an effective counter-insider threat program and are there some methods — such as training employees or using technology — to help detect these threats early on?

Jaros: One of the most important things we tell our stakeholders, particularly leaders in the organizations we work with, is that absent leadership buy-in and commitment from high-level executives in and out of government will not get your program off the ground. That is the number one requirement for creating and sustaining a comprehensive counter-insider threat program. Beyond that, another way for organizations to fall short pretty quickly is to not have a reporting structure that is robust, trusted, [and] transparent. 

Helping people do something when they see something is incredibly important and for an insider threat program. We want to transmit [that] message to our workforces. It’s not enough to say something to your friend or colleague if you see concerning behavior. It’s not enough to create a hotline number or an email account that never gets checked, or that people don’t understand and trust that there is a human being receiving those messages.

Insider threat programs [should be] personal. They need to educate the workforce about these reporting processes. Make people know that there are, in fact, competent professionals who receive and process these reports. We don’t often think about who the best messenger is for our program. We hire analysts, investigators, [and] psychologists, but that person who is on the front lines of training, who is delivering the message to the general workforce, who is speaking with leaders — it’s incredibly important to get the right person in that role so that they can properly message [others] and represent the program. 

It’s important to tell people in the workforce what they can expect when they contact the counter-insider threat program. It’s important to explain to people why and how they’ll receive updates to their report and in many cases, updates — [especially] specific updates — aren’t allowed because we want to protect individuals’ privacy. We can, however, at the very least acknowledge that the person’s report has come through, explain to the workforce about confidentiality and why we can't give them the details, and [let them know] how their report will be stored [and if] their name [will] be used. It’s not just the confidentiality of the person who’s a person of concern, but it’s also the person who reported. Giving people as much information as possible is really important to build the credibility of the program.

I always tell people, and this is more difficult during COVID, but when and if possible, make these training connections and outreach briefings in-person. Make yourself available for additional questions one-on-one after you’ve talked with large groups. When I was at U.S. Customs and Border Protection, I used to deliver what was then called the “integrity briefing” during their new employee orientation program and after every single session, I would spend some time just waiting around and it never failed. At least one or two people would come up to me and they would ask questions about concerns that they had witnessed.

Building those relationships is incredibly important because then [in] six months or a year if they see something, have a concern, or just have a question, they’ll be more comfortable calling you. So connecting with people personally and helping them navigate the reporting process — it really is a critical piece of an effective counter-insider threat program.

Listen to this episode of Security’s The Security Podcasts now:

The above transcript has been edited for clarity.

KEYWORDS: behavior detection insider risk insider threats risk mitigation security leadership

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Layan Dahhan is a multimedia content specialist for BNP Media. She works with Refrigerated & Frozen Foods Magazine, Industrial Safety and Hygiene News, Quality Magazine and Security Magazine. She was a member of CNN Academy’s inaugural class and has a Master of Science in Journalism from Northwestern University.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC_Web_5Minutes-Shea-0122_1170x658.jpg

    5 minutes with Teresa Shea: Avoiding cyberattacks

    See More
  • Kathleen Kotwica

    5 minutes with Kathleen Kotwica – Challenges in security research

    See More
  • Jenny

    5 minutes with Jennifer Urban – Aviation security during the pandemic

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!