Accession Number:



Leveraging Existing IT Resources for Insider Threat Risk Mitigation

Descriptive Note:

[Technical Report, Other]

Corporate Author:

Carnegie Mellon University Software Engineering Institute

Personal Author(s):

Report Date:


Pagination or Media Count:



Detecting observable indicators of insider risk relies heavily on collection and analysis of specific types of data representing user activity on enterprise systems. Some organizations deploy user activity monitoring UAM software specifically for this purpose, but others are unable to do so, either for cost reasons, lack of support resources, etc. Here, we demonstrate how organizations may leverage existing IT resources to provide meaningful data for insider threat risk mitigation without deploying a stand alone UAM solution.


Subject Categories:

  • Computer Systems Management and Standards

Distribution Statement:

[A, Approved For Public Release]