Councils
Where Expertise Meets Action.
INSA’s policy councils and subcommittees bring together professionals from government, industry, and academia to address the intelligence and national security community’s most pressing challenges. Councils do not just talk about issues; they help shape them.
As a member, councils offer:
- Opportunities to shape policies that strengthen the IC's effectiveness and efficiency
- Thought leadership through white papers, op-eds, podcasts, and panel discussions
- Collaboration with peers and government partners in trusted, solution-focused forums
- Access to government and academic leaders who share challenges, priorities, and opportunities for collaboration
Get Involved!
Council service ensures that INSA members play an active part in advancing policy ideas and solutions that support the U.S. intelligence and national security mission.
Thought Leadership
White Papers & Op-Eds
Components of Effective Insider Threat Programs
Developed by INSA's Insider Threat Subcommittee, Components of Effective Insider Threat Training is designed to help organizations, no matter their organizational size or budget, create an effective training program to mitigate these risks, as well as standardized terminology to foster meaningful information sharing.
The paper examines different types of training, including the advantages of each; offers recommendations for who should be trained and why; details elements of effective training programs; and provides a range of resources available to insider threat program managers.
Podcasts
Components of Effective Insider Threat Programs
Developed by INSA's Insider Threat Subcommittee, Components of Effective Insider Threat Training is designed to help organizations, no matter their organizational size or budget, create an effective training program to mitigate these risks, as well as standardized terminology to foster meaningful information sharing.
The paper examines different types of training, including the advantages of each; offers recommendations for who should be trained and why; details elements of effective training programs; and provides a range of resources available to insider threat program managers.
