Skip to main content

Save or Share this Report

For Security & Risk Professionals

Recruiting And Retaining Insider Threat Analysts

To Avoid An Embarrassing And Devastating Insider Attack, Hire Dedicated Analysts

March 7, 2019

Primary author headshot


Why Read This Report

Whether accidental or malicious, insider incidents can result in fraud, privacy abuses, IP theft, and other damage. It's difficult for security pros to detect this activity because insiders need privileged access to do their jobs. Also, as employees, they're entitled to privacy and due process, so security pros must handle these incidents with greater care. There should be an insider threat program to detect, investigate, and respond to them. This report helps security pros recruit and retain the most critical role of the program: the insider threat analyst.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($745 USD).


Table of Contents

  • Detecting Insider Threats Requires The Right People
  • Lessons From The Fortune 500
  • Recommendations

  • To Hire An All-Star Insider Threat Analyst, Be Inclusive, Not Exclusive
  • Supplemental Material
  • Related Research Documents

Recommended Research