WORKFORCE CYBER
INTELLLIGENCE

RESOURCES

A Human-Centric Approach to Operational Awareness and Risk Management

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

Reports

2023 Cost Of Insider Risks Global Report

Featuring first-time insights on how organizations are funding and governing insider risk programs.

Read More
2023 Cost of Insider Risks Ponemon. Insider threats.

Infographics

2023 Ponemon Cost of Insider Risks Report Infographic

The 2023 Ponemon Cost of Insider Risks infographic depicts the financial effects of an insider incident both before and after…

Read More
Microsoft partners with DTEX for insider risk management to achieve compliance. People working in the office.

Case Studies

Protecting Data and Exceeding Compliance with DTEX and Microsoft

This case study highlights how a government entity transitioned from a box-ticking approach to proactive IRM by leveraging DTEX and…

Read More
Accelerating Insider Risk Management in the Mining Sector

Case Studies

Insider Risk Management in the Mining Sector

This mining company chose DTEX for our consolidated approach to insider risk management for proactive mitigation.

Read More
The psychology of insider risk management videocast.

Webinars

Conversations from the Inside, Episode 2: The Psychology of Insider Risk Management - Time and Place Matters

In the second episode of Conversations from the Inside, Dr. Deanna Caputo from MITRE discusses how psychology plays a role…

Read More
SANS Product Review DTEX InTERCEPT IRM

Webinars

SANS: Next-Gen Insider Threat Visibility & Prevention with DTEX InTERCEPT

Matt Bromiley from SANS Institute reviews DTEX InTERCEPT for Insider Risk Management.

Read More
Forrester Best Practices IRM people engaging together

Reports

Forrester Research: Best Practices Insider Risk Management

Security leaders can use this report to build an insider risk management (IRM) program with research from Forrester.

Read More
Building an Insider Risk Program | 3 Experts Weight In

Videos

H-ISAC: Building a human-centric insider risk program for early detection and prevention of data loss

More than two-thirds of IP theft involves company insiders. As guardians of highly sensitive IP, the pharmaceutical industry is a…

Read More
Female Special Agent Works on a Laptop. In the Background Busy System Control Center with Monitors Showing Data Flow and Insider Risk Management.

Webinars

Conversations from the Inside, Episode 1: Insider Risk Meets Counterintelligence

In this episode, Christopher Burgess and Shawnee Delaney discuss the important role of counterintelligence in insider risk management, and the…

Read More
Business woman talking to her colleagues during a meeting in a boardroom

Solution Briefs

DTEX i3 Team Communications Framework

Download the DTEX i3 Communications Framework to understand how best to communicate with employees to mitigate risk in a way…

Read More
Concentrated serious office worker millennial woman analysing results

Infographics

Insider Risk Resolution Decision Tree

The DTEX i3 team has developed a framework to help analysts and security teams resolve insider risks in a way…

Read More
Gartner Strategies for Midsize Enterprises to Mitigate Insider Risk

Reports

Gartner Strategies for Midsize Enterprises to Mitigate Insider Risk

One of the biggest threats to any business is the one that walks through the front door every day. Midsize…

Read More