{"id":28877,"date":"2023-08-08T02:11:00","date_gmt":"2023-08-08T09:11:00","guid":{"rendered":"https:\/\/www.syteca.com\/?post_type=resources&#038;p=28877"},"modified":"2025-04-30T00:26:21","modified_gmt":"2025-04-30T07:26:21","slug":"guide-n-worksheets-for-insider-threat-program","status":"publish","type":"resources","link":"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program","title":{"rendered":"CISO&#8217;s Practical Guide and Set of Worksheets for Building Insider Threat Program"},"content":{"rendered":"\n\t\t<div  class=\"block-b6c06cac-9a70-4008-b560-85b774bb92fd areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f26438c8-74ca-4606-bcdc-4d8372daf750 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div id=\"breadcrumbs\" class=\"block-b514dd46-7047-46a4-89f2-34f10db3d577 col areoi-element resource-breadcrumbs col-sm-12\">\n\t\t\t\n\t\t\t\n<div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/www.syteca.com\/en\/resources\/%resource_category%\">Resources<\/a><\/span> &gt; <span><a href=\"https:\/\/www.syteca.com\/en\/resources\/white-papers\">White Paper<\/a><\/span> &gt; <span class=\"breadcrumb_last\" aria-current=\"page\">CISO&#8217;s Practical Guide and Set of Worksheets for Building Insider Threat Program<\/span><\/span><\/div>\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-45b87262-2067-4936-a0f8-fd067324a8a7 col areoi-element wp-gallery col-12 col-lg-6 col-xl-6\">\n\t\t\t\n\t\t\t\n\n<h1 class=\"wp-block-heading text-center text-lg-start\">Practical Guide &amp; Worksheets for Building Insider Threat Program<\/h1>\n\n\n<div class=\"rl-gallery-container rl-loading\" id=\"rl-gallery-container-1\" data-gallery_id=\"28957\"> <div class=\"rl-gallery rl-basicgrid-gallery white-paper rl-hover-icon-2\" id=\"rl-gallery-1\" data-gallery_no=\"1\"> <div class=\"rl-gallery-item\"><a href=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/29234833\/Whitepaper-CISO-practical-guide-prev-1-1.png\" title=\"\" data-rl_title=\"\" class=\"rl-gallery-link\" data-rl_caption=\"\" data-rel=\"lightbox-gallery-1\" data-magnific_type=\"gallery\"><img decoding=\"async\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/29234833\/Whitepaper-CISO-practical-guide-prev-1-1.png\" width=\"473\" height=\"648\" alt=\"\"\/><\/a><\/div><div class=\"rl-gallery-item\"><a href=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/29234912\/Whitepaper-CISO-practical-guide-prev-2.png\" title=\"\" data-rl_title=\"\" class=\"rl-gallery-link\" data-rl_caption=\"\" data-rel=\"lightbox-gallery-1\" data-magnific_type=\"gallery\"><img decoding=\"async\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/29234912\/Whitepaper-CISO-practical-guide-prev-2.png\" width=\"473\" height=\"648\" alt=\"\"\/><\/a><\/div> <\/div> <\/div>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e5108d22-a8dc-4401-88c4-1fc60e1010e7 col areoi-element block-white-papers-form col-12 col-lg-6   bg-body\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(16, 206, 158,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-151229e2-1af4-449d-8b55-1ec3a888221b areoi-element hs-white-pares-form\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    region: \"na1\",\n    portalId: \"612026\",\n    formId: \"24f0cd40-7ede-4e57-b918-3bc66737b81e\"\n  });\n<\/script>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-2127817d-34da-44ec-a14a-387c7064ac0e areoi-element container block-about-author mx-0 mx-xxl-auto\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-8f52cdcf-9b5b-425c-a5fd-c84bb86c9d38 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-bef72f02-2bd1-4c78-bd52-abb0824c9ef2 col areoi-element block-description-bg col-12 col-lg-6 order-1 order-lg-0\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(55, 84, 115,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"mb-0\" style=\"font-size:1rem;font-style:normal;font-weight:400\">Acquire expert guidance from Jonathan Care, a top-rated ex-Gartner cybersecurity analyst, on constructing a robust and operationally efficient insider threat program.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2  class=\"wp-block-heading\">Read this paper to <mark style=\"background-color:rgba(0, 0, 0, 0);color:#548ff9\" class=\"has-inline-color\">discover<\/mark> the following:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ready-to-be-used worksheets for building an insider threat program, tracking KPIs and scoring their effectiveness, measuring risk appetite and tolerance, and tracking standards and compliance<\/li>\n\n\n\n<li>Insider Risk vs Insider Threat challenges<\/li>\n\n\n\n<li>A Taxonomy of Insider Risks \u2013 what to watch out for, where and when?<\/li>\n\n\n\n<li>The business value of the RACI Matrix in insider risk management and how to use it for structuring roles and procedures <\/li>\n\n\n\n<li>Stages, cycles and tools of a successful insider risk program<\/li>\n\n\n\n<li>How to measure the effectiveness of an insider risk management program<\/li>\n\n\n\n<li>Download the guide now to equip your team with the knowledge and tools needed to establish a comprehensive defense against insider threats and effectively protect your critical assets.<\/li>\n<\/ul>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f5ea0eb1-c56a-4eae-867a-702c075eedbe col areoi-element col-12 col-lg-6 col-xl-6 order-0 order-lg-1\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e93149a8-db7f-4cab-9486-d2367d94b937 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-fd1cabef-9335-4318-9f9c-9b047ddd8897 col areoi-element col-12 col-md-6 col-lg-12 order-1 order-md-0\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"336\" height=\"403\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/12\/image-65.png\" alt=\"\" class=\"wp-image-4120\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/12\/image-65.png 336w, https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/12\/image-65-250x300.png 250w\" sizes=\"(max-width: 336px) 100vw, 336px\" \/><\/figure>\n<\/div>\n\n\n\t\t<div  class=\"block-2a893644-491b-4763-ac1e-1e428d0eec80 areoi-element d-flex justify-content-around flex-md-column w-100 py-3 d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"btn-link btn-link-underlined\" style=\"font-size:1rem;font-style:normal;font-weight:600\"><a href=\"https:\/\/www.linkedin.com\/in\/computercrime\/?originalSubdomain=uk\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn Profile<\/a><\/p>\n\n\n\n<p class=\"btn-link btn-link-underlined\" style=\"font-size:1rem;font-style:normal;font-weight:600\"><a href=\"https:\/\/www.gartner.com\/analyst\/53159\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner Profile<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-426f6950-e2eb-41b1-86f9-8036bc520798 col areoi-element col-12 col-md-6 col-lg-12 order-0 order-md-1\">\n\t\t\t\n\t\t\t\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2  class=\"wp-block-heading\">About the author<\/h2>\n\n\n\n<p>With a distinguished career as a top-rated Gartner analyst, Jonathan Care has been at the forefront of defining the fraud market and leading Gartner\u2019s Insider Threat and Risk research. He holds several industry accolades and certifications, including Certified Fraud Examiner, PCI DSS Qualified Forensic Investigator, PCI DSS Qualified Security Assessor, PCI Payment Applications Qualified Security Assessor, U.K. Government Accredited Penetration Tester, and U.K. Government Listed Security Advisor\u200b.<\/p>\n\n\n\n<p>Having advised cybersecurity leaders worldwide and testified as an expert witness and forensic investigator in courts, Jonathan shares unparalleled expertise in \u201cA Modern Guide to Running an Effective Insider Threat Program.\u201d Download the guide now to tap into his extensive industry experience and fortify your organization against internal risks.<\/p>\n\n\n\n\t\t<div  class=\"block-7a89450e-0678-482c-b8f5-33d800235645 areoi-element d-flex justify-content-around flex-md-column py-3 d-none d-sm-none d-md-none d-lg-block\">\n\t\t\t\n\t\t\t\n\n<p class=\"btn-link btn-link-underlined\" style=\"font-size:1rem;font-style:normal;font-weight:600\"><a href=\"https:\/\/www.linkedin.com\/in\/computercrime\/?originalSubdomain=uk\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn Profile<\/a><\/p>\n\n\n\n<p class=\"btn-link btn-link-underlined\" style=\"font-size:1rem;font-style:normal;font-weight:600\"><a href=\"https:\/\/www.gartner.com\/analyst\/53159\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner Profile<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-177d49dd-a200-4b3d-8f3f-eeb26b42b267 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bd4c07de-706d-4e58-9170-e0ed461a285f row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-042a19fc-853d-4835-8b2e-094f7cb6f1cf col areoi-element block-share-social-buttons\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Share:<\/p>\n\n\n\n<ul class=\"wp-block-social-links has-icon-color has-icon-background-color is-layout-flex wp-block-social-links-is-layout-flex\"><li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-linkedin  wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwhite-papers%2Fguide-n-worksheets-for-insider-threat-program&#038;title=\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-facebook  wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwhite-papers%2Fguide-n-worksheets-for-insider-threat-program\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-twitter  wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwhite-papers%2Fguide-n-worksheets-for-insider-threat-program&#038;text=\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M22.23,5.924c-0.736,0.326-1.527,0.547-2.357,0.646c0.847-0.508,1.498-1.312,1.804-2.27 c-0.793,0.47-1.671,0.812-2.606,0.996C18.324,4.498,17.257,4,16.077,4c-2.266,0-4.103,1.837-4.103,4.103 c0,0.322,0.036,0.635,0.106,0.935C8.67,8.867,5.647,7.234,3.623,4.751C3.27,5.357,3.067,6.062,3.067,6.814 c0,1.424,0.724,2.679,1.825,3.415c-0.673-0.021-1.305-0.206-1.859-0.513c0,0.017,0,0.034,0,0.052c0,1.988,1.414,3.647,3.292,4.023 c-0.344,0.094-0.707,0.144-1.081,0.144c-0.264,0-0.521-0.026-0.772-0.074c0.522,1.63,2.038,2.816,3.833,2.85 c-1.404,1.1-3.174,1.756-5.096,1.756c-0.331,0-0.658-0.019-0.979-0.057c1.816,1.164,3.973,1.843,6.29,1.843 c7.547,0,11.675-6.252,11.675-11.675c0-0.178-0.004-0.355-0.012-0.531C20.985,7.47,21.68,6.747,22.23,5.924z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Twitter<\/span><\/a><\/li><\/ul>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t","protected":false},"featured_media":55743,"menu_order":0,"template":"","class_list":["post-28877","resources","type-resources","status-publish","has-post-thumbnail","hentry","resource_category-white-papers"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISO&#039;s Practical Guide and Set of Worksheets for Building Insider Threat Program | Syteca<\/title>\n<meta name=\"description\" content=\"Get the insider threat program guide and KPI worksheets to establish a comprehensive defense against insider threats and improve continuously\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISO&#039;s Practical Guide and Set of Worksheets for Building Insider Threat Program | Syteca\" \/>\n<meta property=\"og:description\" content=\"Get the insider threat program guide and KPI worksheets to establish a comprehensive defense against insider threats and improve continuously\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-30T07:26:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/30002613\/cover-CISO-practical-guide.png\" \/>\n\t<meta property=\"og:image:width\" content=\"624\" \/>\n\t<meta property=\"og:image:height\" content=\"324\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program\",\"url\":\"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program\",\"name\":\"CISO's Practical Guide and Set of Worksheets for Building Insider Threat Program | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/30002613\/cover-CISO-practical-guide.png\",\"datePublished\":\"2023-08-08T09:11:00+00:00\",\"dateModified\":\"2025-04-30T07:26:21+00:00\",\"description\":\"Get the insider threat program guide and KPI worksheets to establish a comprehensive defense against insider threats and improve continuously\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/30002613\/cover-CISO-practical-guide.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/30002613\/cover-CISO-practical-guide.png\",\"width\":624,\"height\":324},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Resources\",\"item\":\"https:\/\/www.syteca.com\/en\/resources\/%resource_category%\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"White Paper\",\"item\":\"https:\/\/www.syteca.com\/en\/resources\/white-papers\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CISO&#8217;s Practical Guide and Set of Worksheets for Building Insider Threat Program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISO's Practical Guide and Set of Worksheets for Building Insider Threat Program | Syteca","description":"Get the insider threat program guide and KPI worksheets to establish a comprehensive defense against insider threats and improve continuously","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program","og_locale":"en_US","og_type":"article","og_title":"CISO's Practical Guide and Set of Worksheets for Building Insider Threat Program | Syteca","og_description":"Get the insider threat program guide and KPI worksheets to establish a comprehensive defense against insider threats and improve continuously","og_url":"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program","og_site_name":"Syteca","article_modified_time":"2025-04-30T07:26:21+00:00","og_image":[{"width":624,"height":324,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/30002613\/cover-CISO-practical-guide.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program","url":"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program","name":"CISO's Practical Guide and Set of Worksheets for Building Insider Threat Program | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/30002613\/cover-CISO-practical-guide.png","datePublished":"2023-08-08T09:11:00+00:00","dateModified":"2025-04-30T07:26:21+00:00","description":"Get the insider threat program guide and KPI worksheets to establish a comprehensive defense against insider threats and improve continuously","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/30002613\/cover-CISO-practical-guide.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/30002613\/cover-CISO-practical-guide.png","width":624,"height":324},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Resources","item":"https:\/\/www.syteca.com\/en\/resources\/%resource_category%"},{"@type":"ListItem","position":2,"name":"White Paper","item":"https:\/\/www.syteca.com\/en\/resources\/white-papers"},{"@type":"ListItem","position":3,"name":"CISO&#8217;s Practical Guide and Set of Worksheets for Building Insider Threat Program"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/resources\/28877","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/resources"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/55743"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=28877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}