CHICAGO, IL USA | THE HAGUE, NETHERLANDS
|

(312) 659-3000


D O N O V A N   R I S K

Insider Threat ADVISORY SERVICES and TRAINING

image184

DISCRETE | PROFESSIONAL | EFFECTIVE 

Gartner on Insider Threat Detection solutions

Forge a Foundation First!

"Cleaver humans will always be able to outmaneuver other humans that are simply not as clever. [It is] much harder to address the governance, people and process issues that must be grappled with before technology can be properly used."  -Gartner

CAN YOU ANSWER THESE QUESTIONS about your current state?

image185

The Insider Threat is increasing with global shifts

Ninety percent of organizations feel vulnerable to insider threats. The reality is, one hundred percent of organizations are at risk. 


Do you have a formal written program in place to mitigate such risks?  Does it meet compliance requirements?

image186

Intelligence & Counterintelligence is more than buzz

Threat Intelligence is more than a buzz word. Intelligence is a discipline forged in the analytical ability to turn data into information, information into intelligence, and intelligence to insights. 


Are you providing insights to your C-suite or just raw information? 

image187

Don't pay for fluff and bloat

Software or high end consulting services don't always correlate to your risk management needs. Costs can quickly run skyward with subscription and hourly fee bloat.


Wouldn't it be more valuable  to  establish a viable program  first as your foundation that considers Insider Threat Governance, Risk, and Compliance across IT, Legal, HR, and Operations  and that is functional, scalable, and leverages the resources you have available ---before adding more cost and complexity? 

HERE'S HOW WE CAN HELP. INSIDER THREAT AND CONFIDENTIAL INFORMATION PROTECTION GUIDANCE

Insider Threat Services

image188

  • Insider Threat Roadmap and Program Development
  •  Cyber and/or Physical Insider Threat Program Assessments
  • REDREVIEW
  • Threat Scenario, Use Case, & Indicator Workgroups
  • In5ider Threat - 5 Pillar Methodology


Training & Curriculum Development

image189

  • Insider Threat Awareness
  • Counterintelligence Approaches to Cyber Security
  • Intellectual Property Identification and Protection
  • Intelligence Analysis and Writing for Cyber Professionals

Intellectual Property Protection

image190

  • Trade Secret Asset Management
  • Trade Secret Inventory & Audit
  • Trade Secret Asset Management System Implementation using the Trade Secret Office Trade Secret Examiner Software (www.thetso.com)

image191

WHO WE ARE DRIVES WHAT WE DO

CYBER. BEHAVIOR. INTELLIGENCE

Insider Threat mitigation and Intellectual Property protection requires a hybrid approach. Your first critical point is to understand what your business does and where it's value resides. 


Once you know what to protect, you can identify what threats may exist that could circumvent your trust factors and risk controls to exploit vulnerabilities within your organization. Those fissures are the risk factors that threaten your company's value, reputation, and competitive differentiation. 


Unfortunately, if you cannot express that risk information as cogent intelligence to provide actionable insights, the C-suite or internal stakeholders will not fully appreciate the potential impacts if an insider threat event occurs.


We can help you get your arms around the myriad threat factors and apply them to your organizational constructs in a program that will be effective and can also address many regulatory expectations. Let's talk.

SCOTT SWANSON, OWNER

Scott Swanson is the owner and lead consultant for Donovan Risk. With over 20 years of experience in government intelligence, enterprise software, and Big 4 Risk consulting, he is a recognized expert in intelligence analysis, counterintelligence, financial crimes, and cyber and physical security.

LinkedIn Profile

Our Partners

image192
image193
image194
image195