top of page
All Posts


Look in the Mirror: How Organizational Blind Spots Create Insider Risk
Insider threats occur when someone uses legitimate access (intentionally or accidentally) to harm the organization.
Insider threats arise from a mix of personal vulnerabilities and organizational conditions. It’s not just who someone is—it’s what they experience and how the organization responds.
Dr. Frank L. Greitzer
20 hours ago5 min read


Reassembling the Shredded Puzzle: A Conceptual Model for Insider Risk Assessment
Understanding insider threats has long been compared to “connecting the dots,” but this analogy dramatically understates the complexity of the real analytic challenge. In work conducted between 2005 and 2010, I introduced the “shredded puzzle graphic” as a way to more accurately depict the process of insider threat assessment—a multilayered, inference driven workflow that transforms raw, heterogeneous data into meaningful behavioral interpretations.
Dr. Frank L. Greitzer
Mar 224 min read
bottom of page

