Accessibility Tools

Skip to main content

Access World-Class NIST RMF Documentation with ASP Learn More

Detecting and Deterring an Insider Threat - Perspectives from the FBI

Arlington Security Portal

Get Access to 100 + NIST RMF security and privacy policies & procedures, programs, and plan templates.

According to the FBI, a company can often detect or control when an outsider (non-employee) tries to access company data either physically or electronically, and can mitigate the threat of an outsider stealing company property. However, the thief who is harder to detect and who could cause the most damage is the insider—the employee with legitimate access. That insider may steal solely for personal gain, or that insider may be a “spy” — someone who is stealing company information or products in order to benefit another organization or country.

Protect your Intellectual Property: Organizations face an increasing threat of intellectual property theft, which can go unnoticed for months or years. Employees may take proprietary information when searching for a new job. Congress has strengthened criminal laws to protect innovation and prevent intellectual property violations from becoming a standard cost of doing business. Competitors or foreign governments may try to place a spy or recruit an existing employee to gain access to non-public information.

Do Your Part:  Organizations need to do their part to deter intellectual property theft:

  • Educate and regularly train employees on security or other protocols.
  • Ensure that proprietary information is adequately, if not robustly, protected.
  • Use appropriate screening processes to select new employees.
  • Provide non-threatening, convenient ways for employees to report suspicions.
  • Routinely monitor computer networks for suspicious activity.
  • Ensure security (to include computer network security) personnel have the tools they need.

Insider Threat Program Toolkit for Federal Contractors

Arlington’s Insider Threat Training Toolkit is an incredibly comprehensive set of documents that includes all necessary subject matter for designing, documenting, implementing, and maintaining an insider threat program to prevent, deter, detect, and mitigate the threats insiders may pose to an organization.

Moreover, the insider threat training toolkit includes training, education, and awareness initiatives and supporting material for ensuring your program is comprehensive, meeting the needs of your organization. Furthermore, the documentation is easy-to-use and customize for your organization’s exact needs.

About Arlington

We are Arlington, a team of innovative, solution-oriented, highly agile, and well-versed professionals with decades of experience in working with America’s defense industry. From emerging cybersecurity regulations to helping our clients solve complex security & compliance solutions – and so much more – you can trust Arlington, the firm that’s Dedicated to Defense®.  Learn more at