Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Leadership and ManagementLogical SecuritySecurity & Business ResiliencePhysical Security

A human-first approach to minimizing insider threats

By Dale Killinger
laptop with green code on it

Image via Unsplash

February 10, 2023

Every generation has lived in ‘unprecedented times.’ The variables are constantly changing. Currently, there are a few factors that can make it even more tumultuous if business security is a top concern. But it’s not all bad news. There are steps and considerations security leaders can take to protect financial and intellectual assets. 

The past three years have seen a rise in sanctions and political pressures, waves of recessions and higher employee turnover. The attack on the power grid in Moore County, North Carolina and the leak of information from the Supreme Court show the immediate and impactful information can be in the wrong hands. According to a recent report, insider threats accounted for almost 35% of all unauthorized access threat incidents in Q3 of 2022. The danger is real, so what can be done about it? It comes down to the design of an organization’s insider threat program (ITP). 

When thinking of ITP design, it’s easy to assume it comes down to layers and redundancy, such as two-factor authentication, data loss prevention and other technical stopgaps. The heart of the matter is much more human. 

Get support/buy-in from the right C-level member

A program is only effective if it’s utilized and supported by the company, meaning executive leadership is needed onboard and actively participating. The most crucial indicator of a successful ITP is the level at which the executives are engaged. 

The specific title may vary. A chief operations officer or general counsel are often the best candidates with broad organizational positioning — allowing them and the ITP to receive the support needed to be effective.

Recognize a potential threat, make a change

Seventy percent of all insider threat cases relate to some kind of financial motive. Understanding the different financial and compensation structures that impact different teams is an excellent place to start. At big banks, traders have different financial incentives than most other employees.  The same can be said of many business development executives in a large number of corporations. Recognizing these disparities in incentive structures may increase risk and taking actions to decrease the likelihood of threats makes sense.

Where most ITPs miss the mark — not understanding culture

The topic of corporate and/or team culture is rarely mentioned in the context of recognizing and addressing insider threat issues. Organizations are complex and the factors which contribute to corporate culture — the shared attitudes, values, goals and practices — are complex and intertwined as well. An effective ITP incorporates the review of organizational practices which may increase risk for potential for insider threats.   

Such reviews may discover policies which inadvertently benefit one employee group over another, thereby increasing tension within the work groups, such as the financial incentive programs mentioned earlier. Another example may be circumstances where one set of employees has unrecognized access to corporate trade secrets or sensitive intellectual property.  

Successful approach means realigned focus with intent

Effective ITP’s are lead from the top of the organization, focus on the employees and technology provides key support to identifying potential risk and assisting in understanding the context within which employees work. Any company can suffer a catastrophic loss from an insider incident. The risks are too great to not take the time to be deliberate in developing an ITP.

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: asset protection insider threats risk management threat response workplace culture

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dalek

Dale Killinger is a Senior Consultant for Global Data Risk and Retired Special Agent, Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0120-insider-Feat-slide1_900px

    Rethinking "Red Flags" - A New Approach to Insider Threats

    See More
  • security-partners-fp117x658v4.jpg

    How to keep a pulse on insider threats

    See More
  • Vector graphic man sitting at computer

    Human error and insider threats: Resilience in IT

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing