No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Risk

Uniting Forces: Cross-Functional Approaches to Insider Threat Prevention

Creating a structured framework that brings together security, HR, IT, legal and compliance teams to fight internal vulnerabilities

by Rachel L. Gerstein
April 8, 2025
in Risk
avengers lego figures

While companies invest heavily in external cybersecurity, the risks posed by employees and contractors with legitimate access often go underaddressed. Ethics and compliance leader Rachel L. Gerstein explores how a structured insider threat working group can transform disparate departmental efforts into a cohesive strategy that identifies threats early, coordinates responses effectively and continuously improves organizational security. 

Insider threats are a growing concern for companies, especially with the rise of remote work. Generally, insider threats consist of security or cybersecurity risks posed by someone with access to the company’s systems, such an employee or a third-party contractor, who intentionally or unintentionally misuses that access to hurt the company by stealing data, corrupting systems or violating policies.

Insider threats are often referred to as malicious (intentional) or negligent (unintentional). A malicious insider has a deliberate intent to harm the company, such as by engaging in espionage. A negligent insider inadvertently exposes sensitive data due to carelessness like not following security policies and protocols. Whether malicious or negligent, these threats can cause damage to a company’s reputation, compromise highly confidential data and lead to lengthy and costly regulatory investigations and lawsuits.

Companies need to be smart about recognizing insider threats. Signs of potential insider threats include accessing information outside of job responsibilities, downloading large amounts of data, having unusual patterns of access to data, disgruntled behavior or suspicious activity, especially when it comes to a company’s systems. 

There are many ways to mitigate insider threats, including having strong access controls to data, training employees and third parties on security measures, strict background checks and screening processes (where permitted by law) and exit procedures for employees, such as exit interviews and timely data access restrictions. In addition to implementing these mitigation tools, companies need to be on high alert for the signs of potential insider threats noted above.

In my experience, coordinating cross-functional efforts to combat insider threats works best by forming an insider threat working group (ITWG). While required by law for organizations handling classified information (see NISPOM), an ITWG is also a highly recommended best practice for other companies. This cross-functional team includes representatives from physical security, HR, IT/information security, legal and compliance working together to prevent, detect, and respond to insider threats while ensuring legal compliance.

Key responsibilities of an ITWG include:

Risk identification and assessment

The ITWG identifies potential insider threat risks, such as unusual login locations, employees with frequent policy violations or conflicts with coworkers, disgruntled employees or third parties and employees or third parties downloading increased data or data unrelated to their jobs. To do this, close collaboration is needed between the ITWG and the teams in legal, compliance, HR and IT. For example, the ITWG would need to work with IT to ensure that the company flags any IP addresses from foreign or unexpected locations, which could indicate remote work from outside the employee’s usual area.

Developing insider threat policies

The ITWG collaborates to create and enforce policies to prevent, detect and address insider threats. Companies should establish clear security policies that define acceptable use of systems and data, including access controls, password policies, multi-factor authentication, monitoring guidelines and acceptable use rules. There should also be policies related to the handling, storage and transfer of data. Companies should also adhere to the principle of least privilege, which allows users access only to data needed to perform their jobs and no more. Further, it is important that when policies and controls are violated, there are real consequences for the relevant associates and third parties.

blocks representing insider threat
Risk

Understanding What Motivates Malicious Insider Attacks Can Help Inform Mitigation Strategies

by Jessica Barker
July 9, 2024

Money is often prime driver — but it’s not the only incentive

Read moreDetails

Detection and monitoring coordination

The ITWG collaborates with the relevant teams to monitor policy compliance and detect fraudulent activities, such as logging in from suspicious IP addresses. It should work with IT to implement systems to monitor employee behavior and identify unusual or suspicious behavior. There should also be clear incident response procedures to quickly identify, limit exposure and remediate any insider threats or breaches. Additionally, physical security plays an important role by ensuring that only those with proper identification are allowed access to areas containing business information. There should be monitoring technologies present to deter and detect unauthorized access. Further, the ITWG should work with internal audit to conduct regular audits to identify vulnerabilities and ensure compliance with policies.

Incident response and investigation

The ITWG coordinates the organization’s response to insider threats, ensuring investigations are conducted in compliance with legal standards and that appropriate actions are taken to minimize damage and protect data. The ITWG may also benchmark with other organizations to ensure that best practices are employed in all areas of responsibility.

Prevention of insider threats

Preventive measures include employee and third-party background checks (initial and recurring), screenings, identifying false IDs, exit interviews and monitoring employee and third-party behavior. The ITWG collaborates with teams like HR and IT to ensure comprehensive preventive strategies are in place. Further, the ITWG can advocate for data loss prevention (DLP) solutions to detect and prevent data loss or exfiltration. The ITWG also reviews cases of fraud, insider threats, etc., from other organizations to identify external lessons that can be learned and potential preventive measures.

Cross-functional collaboration

ITWG members from various functions provide a holistic approach to insider threats. The teams on the ITWG are the ones engaged in all relevant activities, from assessment to prevention to investigation when incidents arise. They also allow for information to be quickly cascaded up or down in their relevant functions. By sharing insights, past experiences and effective strategies, the team fosters a culture of continuous learning and improvement across the organization, with the goal of reducing and containing insider threats.

Training and awareness

The ITWG plays a vital role in creating and promoting employee, and possibly third party, training on recognizing and reporting suspicious activity. Regular training on insider threats and the company’s security policies should be conducted. Another area of opportunity is creating a security culture, where employees truly understand the importance of security and their role in protecting data and systems. Further, the ITWG works with legal, HR and compliance to ensure employees feel safe reporting threats without fear of retaliation.

Continuous improvement

After any insider threat incident, the ITWG conducts a retrospective review to capture lessons learned and identify improvement opportunities. Those lessons learned should be shared with relevant team members outside the ITWG, including within senior management. In addition to learning lessons from its own experiences, the ITWG should ensure it stays informed about emerging insider threats occurring at other companies and that it updates policies and systems accordingly.

Collaboration with external groups

The ITWG should collaborate with industry groups and government agencies, with the input and support of senior management, to share best practices and intelligence. This can be a sensitive area, so the ITWG should ensure that all the relevant team members, including senior management, are consulted before a decision is made to provide information to external groups.

Clearly, the ITWG has a huge amount of work to do. It should meet at least quarterly, and there should be a leader who sets clear agendas, priorities and timelines with input from the larger group. The work of the ITWG can be part of a report out to senior management and even the audit committee or other board committee. This kind of cross-functional collaboration can lead to a significant reduction in insider threat risk.


Tags: Cyber RiskThird Party Risk Management
Previous Post

Teaching Machines to Spot What Matters

Next Post

Relationship (Owner) Goals: Why Half Your TPRM Red Flags Stay Hidden

Rachel L. Gerstein

Rachel L. Gerstein

Rachel L. Gerstein is an ethics and compliance professional, most recently serving as managing vice president of global ethics & compliance counsel at Gartner. Prior to Gartner, she was executive director of ethics and compliance at Avon. She began her legal career as an associate at Weil Gotshal & Manges, later moving to Akin Gump Strass Hauer & Feld.

Related Posts

GAN Integrity TPRM & AI

Where TPRM Meets AI: Balancing Risk & Reward

by Corporate Compliance Insights
May 13, 2025

Is your organization prepared for the dual challenges of AI in third-party risk management? Whitepaper Where TPRM Meets AI: Balancing...

robot reviewing contract

9 Emerging Use Cases for AI in TPRM

by Miriam Konradsen Ayed and Craig Moss
May 6, 2025

(Sponsored) As third-party ecosystems grow more complex, compliance teams face mounting pressure to assess and monitor external relationships effectively. Miriam...

news roundup green bars

In-House Counsel Salary Increases Slow

by Staff and Wire Reports
May 2, 2025

Majority of execs predict rise in fincrime in ’25

data abstract green purple

66% of CISOs Worry Cyber Threats Are More Advanced Than Companies’ Defenses

by Staff and Wire Reports
April 25, 2025

US business sector falling behind in adoption of renewable energy

Next Post
business relationship concept hands

Relationship (Owner) Goals: Why Half Your TPRM Red Flags Stay Hidden

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights