An Assessment of Data Analytics Techniques for Insider Threat Programs

July 31, 2018

A wide array of data analytics methods, tools, and techniques exist to improve the detection and mitigation of insider threats – trusted employees who seek to steal an organization’s data or intellectual property or to harm an organization or its staff. Determining which data analytics methods and software tools are best for an organization, however, depends on the quality and comprehensiveness of data, the clarity of rules, the organization’s risk tolerance, and other factors.

This paper presents a framework which plots the continuum of data analytics techniques used to solve specific insider threat problems. Decision-makers and insider threat program managers in both government and industry can leverage this framework to evaluate the merits of different analytic techniques and then choose or develop tools to address their most pressing needs.

[button text="Download This Paper (PDF)" url="https://www.insaonline.org/wp-content/uploads/2018/08/INSA_Insider-Threat_Data-Analytics-July-2018.pdf" size="middle" type="default" text_color="#fff" mouseover_text_color="#000" bg_color="#14b3e4" bg_transparent="0" mouseover_bg_color="" mouseover_bg_transparent="1" border_color="" border_color_transparent="1" mouseover_border_color="#000" mouseover_border_color_transparent="0" sc_id="sc39938560498"]