Skip to main content

Save or Share this Report

For Security & Risk Professionals

Best Practices: Mitigating Insider Threat

Processes: The Zero Trust Security Playbook

March 18, 2021


Playbook icon

This is the Processes report in The Zero Trust Security Playbook For 2021.

Why Read This Report

Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros to detect this suspicious activity because insiders need to have privileged access to data to do their jobs. Since insiders are people and, therefore, entitled to privacy and due process, security pros must handle these incidents with greater care than external threats. This report describes how to build an insider threat program. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($745 USD).


Table of Contents

  • All Data Theft Is An Inside Job — And It Will Cost Your Business
  • Follow Forrester's Six Best Practices For Addressing Insider Risk
  • What It Means

  • Insider Threats Will Increase And Bring Logical And Physical Impacts
  • Supplemental Material
  • Related Research Documents

Recommended Research