Insider Threat Analysis

Responsible for identifying and assessing the capabilities and activities of cybersecurity insider threats; produces findings to help initialize and support law enforcement and counterintelligence activities and investigations.

  • T1056: Acquire resources to support cybersecurity program goals and objectives
  • T1057: Conduct an effective enterprise continuity of operations program
  • T1062: Contribute insider threat expertise to organizational cybersecurity awareness program
  • T1084: Identify anomalous network activity
  • T1085: Identify potential threats to network resources
  • T1119: Recommend vulnerability remediation strategies
  • T1160: Develop risk mitigation strategies
  • T1161: Resolve system vulnerabilities
  • T1162: Recommend security changes to systems and system components
  • T1227: Manage cybersecurity budget, staffing, and contracting
  • T1266: Recommend risk mitigation strategies
  • T1324: Process digital evidence
  • T1325: Document digital evidence
  • T1439: Assess the behavior of individual victims, witnesses, or suspects during cybersecurity investigations
  • T1510: Preserve digital evidence
  • T1592: Conduct cybersecurity reviews
  • T1689: Create comprehensive exploitation strategies
  • T1690: Identify exploitable technical or operational vulnerabilities
  • T1698: Collect target information
  • T1712: Recommend potential courses of action
  • T1737: Develop intelligence collection strategies
  • T1743: Identify information collection gaps
  • T1789: Provide aim point recommendations for targets
  • T1790: Provide reengagement recommendations
  • T1799: Notify appropriate personnel of imminent hostile intentions or activities
  • T1801: Determine validity and relevance of information
  • T1969: Document system alerts
  • T1970: Escalate system alerts that may indicate risks
  • T1971: Disseminate anomalous activity reports to the insider threat hub
  • T1973: Conduct independent comprehensive assessments of target-specific information
  • T1974: Conduct insider threat risk assessments
  • T1975: Prepare insider threat briefings
  • T1976: Recommend risk mitigation courses of action (CoA)
  • T1977: Coordinate with internal and external incident management partners across jurisdictions
  • T1978: Recommend improvements to insider threat detection processes
  • T1979: Determine digital evidence priority intelligence requirements
  • T1980: Develop digital evidence reports for internal and external partners
  • T1981: Develop elicitation indicators
  • T1982: Identify high value assets
  • T1983: Identify potential insider threats
  • T1985: Identify imminent or hostile intentions or activities
  • T1986: Develop a continuously updated overview of an incident throughout the incident's life cycle
  • T1987: Develop insider threat cyber operations indicators
  • T1988: Integrate information from cyber resources, internal partners, and external partners
  • T1989: Advise insider threat hub inquiries
  • T1990: Conduct cybersecurity insider threat inquiries
  • T1991: Deliver all-source cyber operations and intelligence indications and warnings
  • T1992: Interpret network activity for intelligence value
  • T1993: Monitor network activity for vulnerabilities
  • T1994: Identify potential insider risks to networks
  • T1995: Document potential insider risks to networks
  • T1996: Report network vulnerabilities
  • T1997: Develop insider threat investigation plans
  • T1998: Investigate alleged insider threat cybersecurity policy violations
  • T1999: Refer cases on active insider threat activities to law enforcement investigators
  • T2001: Establish an insider threat risk management assessment program
  • T2003: Evaluate organizational insider risk response capabilities
  • T2004: Document insider threat information sources
  • T2005: Conduct insider threat studies
  • T2006: Identify potential targets for exploitation
  • T2007: Analyze potential targets for exploitation
  • T2008: Vet insider threat targeting with law enforcement and intelligence partners
  • T2009: Develop insider threat targets
  • T2010: Maintain User Activity Monitoring (UAM) tools
  • T2011: Monitor the output from User Activity Monitoring (UAM) tools