Insider Threat Leading Practices
February 18, 2026
Copyright Notice All content is protected by international copyright laws. By downloading, you agree to these terms.

Misuse of authorized access to an organization’s critical assets is a significant and complex threat that requires a coordinated, proactive, enterprisewide effort to sufficiently address. This tool is designed to assist auditors in preparing an audit program for insider threats.
Additional resources to use with this IIA Audit Tool
Auditing Insider Threat Programs
Insider Threat Assessment Using NIST Cybersecurity Framework