Welcome to the Insider Threat Survey

 
5% of survey complete.
Highly publicized insider data thefts and security breaches highlight the increasing need for better security practices and solutions to reduce the risks posed by malicious insiders as well as unintentional insiders.

We are conducting this survey to gain more insight into the state of insider threats, and the solutions and best practices to detect and prevent insider threats. The findings from this peer-sourced research will be compiled into the Insider Threat Report to provide you with the latest trends, statistics and valuable benchmarks.

Take this 15-minute survey to learn how your peers are approaching insider threats, get valuable benchmarks, and receive a free, advance copy of the complete Insider Threat Report as soon as it becomes available.

Thank you in advance for participating in this survey.

Question Title

* 1. What type of insider threats are you most concerned about? (Select all that apply)

Question Title

* 2. What motivations for malicious insider threats are you most concerned about? (Select all that apply)

Question Title

* 3. How would you characterize the effectiveness of your organization to monitor, detect, and respond to insider threats? (Select one)

Question Title

* 4. How do you measure the effectiveness of your organization’s insider threat program? (Select all that apply) HAY

Question Title

* 5. Did you build your insider threat program first and then select vendors to deploy the tools you needed, or did you select the vendors first? (Select one) HAY

Question Title

* 6. What is the primary driver of your insider threat program? (Select all that apply)

T