Our team of seasoned counterintelligence and security professionals work with clients to guide them through an in-depth risk assessment process to identify and prioritize company assets, including intellectual property, and to highlight capabilities and activities requiring protection from malicious insiders. Whether seeking embedded support to build an insider threat detection program from the ground-up, or to transform existing program capabilities to manage risk, we offer cost-effective tailored solutions. Customized products include:
- Employee insider threat awareness or skill training.
- Technical assistance with establishing a centralized user activity monitoring system, data fusion and coordinated analysis.
- Assessment of employee vetting practices.
- Support to preliminary inquiries and investigations of actual insider threat incidents.