Councils

Join A Council!

Council service is open to INSA members in good standing. Simply complete this brief form & our membership team will contact you with next steps. 

Apply to Join! 

Where Expertise Meets Action.

INSA’s policy councils and subcommittees bring together professionals from government, industry, and academia to address the intelligence and national security community’s most pressing challenges. Councils do not just talk about issues; they help shape them.

As a member, councils offer:

  • Opportunities to shape policies that strengthen the IC's effectiveness and efficiency 
  • Thought leadership through white papers, op-eds, podcasts, and panel discussions
  • Collaboration with peers and government partners in trusted, solution-focused forums
  • Access to government and academic leaders who share challenges, priorities, and opportunities for collaboration

Get Involved!

Council service ensures that INSA members play an active part in advancing policy ideas and solutions that support the U.S. intelligence and national security mission.


Thought Leadership

White Papers & Op-Eds

An Assessment of Data Analytics Techniques for Insider Threat Programs

Jul 31, 2018, 00:00 by Christopher Nardozza

A wide array of data analytics methods, tools, and techniques exist to improve the detection and mitigation of insider threats – trusted employees who seek to steal an organization’s data or intellectual property or to harm an organization or its staff. Determining which data analytics methods and software tools are best for an organization, however, depends on the quality and comprehensiveness of data, the clarity of rules, the organization’s risk tolerance, and other factors.

This paper presents a framework which plots the continuum of data analytics techniques used to solve specific insider threat problems. Decision-makers and insider threat program managers in both government and industry can leverage this framework to evaluate the merits of different analytic techniques and then choose or develop tools to address their most pressing needs.

[button text="Download This Paper (PDF)" url="https://www.insaonline.org/wp-content/uploads/2018/08/INSA_Insider-Threat_Data-Analytics-July-2018.pdf" size="middle" type="default" text_color="#fff" mouseover_text_color="#000" bg_color="#14b3e4" bg_transparent="0" mouseover_bg_color="" mouseover_bg_transparent="1" border_color="" border_color_transparent="1" mouseover_border_color="#000" mouseover_border_color_transparent="0" sc_id="sc39938560498"]
Podcasts

An Assessment of Data Analytics Techniques for Insider Threat Programs

Jul 31, 2018, 00:00 by Christopher Nardozza

A wide array of data analytics methods, tools, and techniques exist to improve the detection and mitigation of insider threats – trusted employees who seek to steal an organization’s data or intellectual property or to harm an organization or its staff. Determining which data analytics methods and software tools are best for an organization, however, depends on the quality and comprehensiveness of data, the clarity of rules, the organization’s risk tolerance, and other factors.

This paper presents a framework which plots the continuum of data analytics techniques used to solve specific insider threat problems. Decision-makers and insider threat program managers in both government and industry can leverage this framework to evaluate the merits of different analytic techniques and then choose or develop tools to address their most pressing needs.

[button text="Download This Paper (PDF)" url="https://www.insaonline.org/wp-content/uploads/2018/08/INSA_Insider-Threat_Data-Analytics-July-2018.pdf" size="middle" type="default" text_color="#fff" mouseover_text_color="#000" bg_color="#14b3e4" bg_transparent="0" mouseover_bg_color="" mouseover_bg_transparent="1" border_color="" border_color_transparent="1" mouseover_border_color="#000" mouseover_border_color_transparent="0" sc_id="sc39938560498"]