Radicalization
in the
Workplace
HILLARD HEINTZE © 2016 | Protecting What Matters2
ORIGINS: WHY THE EXECUTIVE CONCERN?
"We are witnessing, in my view, a change in the
nature of mass shootings in the U.S. No longer
are they solely defined by a single, isolated
aggrieved shooter but a shooter or shooters
embedded in, justified by and potentially
supported by an ongoing ideological
framework.”
ALAN J. LIPMAN, FOUNDER AND EXECUTIVE DIRECTOR
THE CENTER FOR THE STUDY OF VIOLENCE IN WASHINGTON D.C.
HILLARD HEINTZE © 2016 | Protecting What Matters3
ORIGINS: WHY THE SPOTLIGHT NOW?
A marked rise in executive concerns
Increasing
focus on
workplace
violence
and active
shooter
prevention
Recent terror
events in
Europe and
Turkey – and
in the U.S.,
from San
Bernardino
to the Navy
Yard
Media
spin,
opinion
and frenzy
Politics
and the
U.S.
election
process
Complexity
of the
issues –
from
privacy to
religious
expression
Overlapping
executive
responsibilities
– Security, HR,
Legal, IT, Law
Enforcement
4
Radicalization cuts across many areas
So where exactly does threatening
behavior related to radicalization fit in?
HILLARD HEINTZE © 2016 | Protecting What Matters
• Workplace violence
• Substance abuse
• Hostile work environment
• Criminal activity
• Inappropriate behavior
• Sexual harassment
HILLARD HEINTZE © 2016 | Protecting What Matters5
DEFINITION
Radicalization
“Radicalization is a personal process in which individuals
adopt extreme political, social and/or religious ideals
and aspirations, and where the attainment of particular
goals justifies the use of indiscriminate violence. It is
both a mental and emotional process that prepares and
motivates an individual to pursue violent behavior.”
Source: A. S. Wilner and C. J. Dubouloz, "Homegrown terrorism and transformative learning:
an interdisciplinary approach to understanding radicalization," GlobalChange, Peace & Security
(formerly Pacifica Review: Peace, Security & Global Change) 22:1 (2010): 38.
HILLARD HEINTZE © 2016 | Protecting What Matters6
What Security and HR leaders are saying
• “Duty of care” obligates
companies to keep the employee
population fully informed
regarding ALL potentially
threatening behaviors and,
conversely, behaviors that may
require tolerance in the
workplace as well as reporting.
• Radicalization falls into a subset of
workplace violence behaviors.
• Awareness training should be provided
to employees regarding radicalization
and orientations.
• Accommodations for particular non-
threatening belief practices should be
considered and established.
HILLARD HEINTZE © 2016 | Protecting What Matters7
The spectrum of potential behavior
that could be “radicalized” should be
broadened to include:
• Gun rights
• Abortion
• Racism
• Animal rights
• Religious extremism
• Ultra right-wing activism
• Ultra left-wing activism
• Environmental activism
HILLARD HEINTZE © 2016 | Protecting What Matters8
ACCOUNTABILITY:
OVERLAPPING AREAS OF RESPONSIBILITY
CATEGORIES
• Workplace Violence
• Hostile Work Environment
• Criminal Behavior
• Cyber
• Sexual Harassment
• Substance Abuse
• Inappropriate Behavior
STAKEHOLDERS
• Security
• HR
• Legal
• IT
• Law Enforcement
ACTIONS
• Document
• Employee Assistance
Program
• Confront
• Report to Law Enforcement
• Counsel
• Personal Action
HILLARD HEINTZE © 2016 | Protecting What Matters9
MANIFESTATION IN THE WORKPLACE
Radicalization can manifest itself as:
• A violent, aggressive, selfless act conducted on a
random target, with encouragement, enabling and
logistical support from an identifiable segment of an
organization that has hijacked or bastardized a goal.
• The result of an openly stated goal or purpose of an
organization or body.
HILLARD HEINTZE © 2016 | Protecting What Matters10
PATHS TO RADICALIZATION
Disciples may be radicalized
through exposure to:
• A narrow indoctrination path.
• No outside contrary opinions.
• The inevitability of a catastrophic
event as the likely outcome.
11
Violent Extremist
Person who advocates, is engaged
in or is preparing to engage in
ideologically motivated terrorist
activities (including providing
support to terrorism) to further
political or social objectives
promoted by a foreign terrorist
organization (FTO).
THREATS: THREE TYPES OF ATTACKERS
HILLARD HEINTZE © 2016 | Protecting What Matters
12
Homegrown Violent Extremist (HVE)
THREATS: THREE TYPES OF ATTACKERS
HILLARD HEINTZE © 2016 | Protecting What Matters
A U.S. person who was once assimilated into,
but who has rejected the cultural values, beliefs
and environment of the U.S. in favor of a
violent extremist ideology.
He or she is “U.S. radicalized” and intends to
commit terrorism inside the U.S. without direct
support or direction from a foreign terrorist
organization.
HILLARD HEINTZE © 2016 | Protecting What Matters13
THREATS: THREE TYPES OF ATTACKERS
Domestic Terrorist
Person who engages in unlawful acts of violence to
intimidate civilian populations or attempt to
influence domestic policy (as opposed to furthering
the aims of a foreign terrorist organization) without
direction from or influence by a foreign actor.
Examples include acts by racist, supremacist,
antigovernment, environmental, animal rights or
other single-issue extremist groups or movements.
14
A sampling of lessons the U.S. intelligence
community is gleaning from recent events
• Radicalization increases the likelihood of violence.
• Individuals and groups follow different paths to violence.
• Multiple factors indicate why some choose terrorist violence.
• A one-factor approach to intervention will fail.
• Factor importance varies across cases and circumstances.
• Some factors serve as catalysts for others and can
trigger a chain of events.
INSIGHTS: FUNDAMENTAL PRINCIPLES OF RADICALIZATION
HILLARD HEINTZE © 2016 | Protecting What Matters
HILLARD HEINTZE © 2016 | Protecting What Matters15
DRIVERS: FACTORS THAT INCREASE AN INDIVIDUAL’S VULNERABILITY
Personal
Factors
Group
Factors
Community
Factors
Sociopolitical
Factors
Ideological
Factors
• Psychological
• Demographic
backgrounds
• Personal
history
• Social
networks
• Family and
peer groups
• Group
dynamics
• Alienation
• Marginalization
• Diaspora
relationships
with home
country
• Collective
grievances
• Foreign policy
• External
events
• Appeal of
justifying
narrative
• Charismatic
ideologues
HILLARD HEINTZE © 2016 | Protecting What Matters16
MOBILIZATION
A Portfolio of Indicators
Other Indicators (Sampling)
• Preparing and disseminating a last
will, martyrdom video or statement.
• Seeking help from family and
friends to enable travel to join
terrorist groups overseas.
• Planning or attempting to travel
to a conflict zone to fight with or
support an FTO.
• Seeking religious or political
justification for violent acts.
• Employing counter-
surveillance techniques.
• Establishing suspicious
travel patterns.
• Deleting social media and
other online accounts to
avoid tracking by law
enforcement.
• Suspicious acquisition of
maps or blueprints.
HILLARD HEINTZE © 2016 | Protecting What Matters17
DEFINITION
Workplace Insider Threats
“A current or former employee, contractor or other business
partner who has or had access to an organization’s network,
system or data and intentionally exceeded or misused that
access in a manner negatively affected the confidentiality,
integrity, or availability of the organization’s information or
information systems.”
DHS NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION CENTER
HILLARD HEINTZE © 2016 | Protecting What Matters18
DEFINITION
Insider Threat
“The insider threat to critical infrastructure is one
or more individuals with the access and/or insider
knowledge of a company, organization or enterprise
that would allow them to exploit the vulnerabilities
of that entity’s security, systems, services, products,
or facilities with intent to cause harm.”
National Infrastructure Advisory Council in their publication,
“The Insider Treat to U.S. Critical Infrastructures”
19
INSIDER THREAT MITIGATION
HILLARD HEINTZE © 2016 | Protecting What Matters
Detect anomalies as early as possible
and investigate before assets, data or
personnel are compromised
Look beyond cyber security to include
potential insider threats related to:
• Fraud
• Workplace violence
• Information technology (IT) sabotage
• Intellectual property and research and
development theft
HILLARD HEINTZE © 2016 | Protecting What Matters20
INSIDER THREATS ARE SELDOM IMPULSIVE ACTS
Look for the warning signs as insiders move
along a threat continuum from idea to action
• Demonstrating a change in
behavior or attitude
• Violating company policy
• Arriving early or staying late
• Showing undue interest in
information not relevant to job
• Attempting access into physical
areas not related to job
21
LEARN THE WARNING SIGNS OF INSIDER THREAT
HILLARD HEINTZE © 2016 | Protecting What Matters
Companies must establish guidelines
on recognizing threat indicators based
on behavioral-based techniques
1. Train employees to recognize and report
behavioral indicators exhibited by fellow
employees or business partners.
2. Ensure training includes how to identify the
characteristics of insiders at risk of becoming
a threat.
HILLARD HEINTZE © 2016 | Protecting What Matters22
CHARACTERISTICS OF INSIDERS AT RISK OF BECOMING A THREAT
• Introversion
• Greed/financial need
• Vulnerability to blackmail
• Compulsive and destructive
behavior
• Rebellious, passive-
aggressive
• Ethical “flexibility”
• Reduced loyalty
• Entitlement – narcissism
(ego/self-image)
• Minimize their mistakes
and faults
• Inability to assume
responsibility
• Intolerance to criticism
• Self-perceived value exceeds
performance
• Lack of empathy
• Predisposition towards law
enforcement
• Pattern of frustration and
disappointment
• History of managing crisis
ineffectively
HILLARD HEINTZE © 2016 | Protecting What Matters23
FREE ONLINE COURSES
DHS/FEMA independent study course,
“Protecting Critical Infrastructure
Against Insider Threats” (IS-915)
http://training.fema.gov/
Department of Defense (DoD),
“Insider Threat Awareness Course”
http://cdsetrain.dtic.mil/itawareness/
HILLARD HEINTZE © 2016 | Protecting What Matters24
KEY ISSUES
Starting the Conversation
4. Determine the scope of monitoring, recording
and reporting on employee online behavior.
5. Establish the parameters of access.
6. Communicate the consequences of
abuse to employees.
1. Engage external partners
– law enforcement,
media, community
services and religious
experts.
2. Understand the role of
technology, social media
and internet usage.
3. Identify technology
vendors that provide
monitoring services.
HILLARD HEINTZE © 2016 | Protecting What Matters25
FOR FURTHER INFORMATION
Howard Fisher, Esq.
Vice President, Strategic Relationships
howard.fisher@hillardheintze.com
312.229.9882
30 South Wacker Drive, Suite 1400
Chicago, Illinois 60606 312.869.8500

More Related Content

PDF
Protecting the Family Office
PDF
Security in Today's Global Threat Environment
PPTX
How to Prevent An Active Shooter in Your Workplace
PDF
Hillard heintze Presentation for ATAP
PDF
Hillard Heintze ASIS Presentation Active Shooter
PDF
InKnowVision November 2012 Special HNW Marketing Webinar - Tom Kasza
PDF
Counter Narco-Terrorism and Drug Interdiction
PPTX
Introduction to Emergency Preparedness
Protecting the Family Office
Security in Today's Global Threat Environment
How to Prevent An Active Shooter in Your Workplace
Hillard heintze Presentation for ATAP
Hillard Heintze ASIS Presentation Active Shooter
InKnowVision November 2012 Special HNW Marketing Webinar - Tom Kasza
Counter Narco-Terrorism and Drug Interdiction
Introduction to Emergency Preparedness

Similar to Radicalization in the Workplace (20)

PDF
Hillard Heintze Radicalization in the Workplace
PDF
Insights on Enhancing the Security of Your Family
PDF
Hillard Heintze Presentation to ATAP - Part 2
PDF
Hillard Heintze Presentation to ATAP - Part 1
PDF
Hillard Heintze ASIS Presentation Active Shooter
PDF
Hillard Heintze Presentation to ATAP - Part 3
PPT
Webinar slides oct 21 2021 dr joshua sinai
PPTX
Workplace Violence With Script
PPTX
WORKPLACE VIOLENCE-presentation.pptx
PDF
The Unthinkable Violence in Healthcare: A Disturbing Challenge to Patient Care
PPTX
Navigating Workplace Violence - A Managers Guide
PDF
Creating an Enterprise-Wide Workplace Violence & Threat Assessment Team
PPT
Workplace environment preventing_violence_in_the_workplace_(presentation_style)
PPT
W Kplace Violence & Security Presentation
PPT
Workplace violence by Brad Hyde
PDF
Best Practices in Assessing & Managing Workplace Threats of Violence
PPTX
Workplace Violence & Realtor Safety
PPT
Workplace Violence
PPT
Workplace environment preventing_violence_in_the_workplace
Hillard Heintze Radicalization in the Workplace
Insights on Enhancing the Security of Your Family
Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze ASIS Presentation Active Shooter
Hillard Heintze Presentation to ATAP - Part 3
Webinar slides oct 21 2021 dr joshua sinai
Workplace Violence With Script
WORKPLACE VIOLENCE-presentation.pptx
The Unthinkable Violence in Healthcare: A Disturbing Challenge to Patient Care
Navigating Workplace Violence - A Managers Guide
Creating an Enterprise-Wide Workplace Violence & Threat Assessment Team
Workplace environment preventing_violence_in_the_workplace_(presentation_style)
W Kplace Violence & Security Presentation
Workplace violence by Brad Hyde
Best Practices in Assessing & Managing Workplace Threats of Violence
Workplace Violence & Realtor Safety
Workplace Violence
Workplace environment preventing_violence_in_the_workplace
Ad

Recently uploaded (20)

DOC
咨询WSU毕业证学历认证,多恩大学毕业证国外本科学位证
PPTX
Management and Leadership across culture at McDonald's
PPTX
Review of "Living Beyond Self Doubt" by Som Bathla
PPTX
Lean Thinking: Making Efficiency an Everyday Thing
PPTX
1.pptx Awareness course managing. safety
PDF
The Pearson Complete Course for CISM Certification: Unit 1
PPTX
3 Information Systems and AI in Change Management.pptx
PPTX
Why work place wellbeing matters BookReview
PPTX
International trading agreements in world.pptx
PPTX
The Impact of Hofstede’s 6D Model on Emotional Intelligence in Global Teams.pptx
PPTX
4 Crisis Management for Master of Business Management.pptx
PPT
Software EffortEstimation and Risk Project Planning Activities Software Scope...
PDF
250816-Risk Evaluation & Mitigation Strategy-CQS.pdf
PPTX
Organisational Leadership and Change Management
PPTX
SM_Behavior Based Safety (BBS)_Unit V.pptx
PPSX
Neurodiversity in the Workplace: Navigating the Manager/Employee Relationship
PPTX
Common Methods of Performance Appraisal.pptx
PPT
risk management (contd.) Risk Identification Risk Components and Drivers Risk...
PPTX
Time Management Techniques_All Rules.pptx
PPTX
EXT.-EDU-809-EXTENSION-POLICY-AND-GOALS-.pptx
咨询WSU毕业证学历认证,多恩大学毕业证国外本科学位证
Management and Leadership across culture at McDonald's
Review of "Living Beyond Self Doubt" by Som Bathla
Lean Thinking: Making Efficiency an Everyday Thing
1.pptx Awareness course managing. safety
The Pearson Complete Course for CISM Certification: Unit 1
3 Information Systems and AI in Change Management.pptx
Why work place wellbeing matters BookReview
International trading agreements in world.pptx
The Impact of Hofstede’s 6D Model on Emotional Intelligence in Global Teams.pptx
4 Crisis Management for Master of Business Management.pptx
Software EffortEstimation and Risk Project Planning Activities Software Scope...
250816-Risk Evaluation & Mitigation Strategy-CQS.pdf
Organisational Leadership and Change Management
SM_Behavior Based Safety (BBS)_Unit V.pptx
Neurodiversity in the Workplace: Navigating the Manager/Employee Relationship
Common Methods of Performance Appraisal.pptx
risk management (contd.) Risk Identification Risk Components and Drivers Risk...
Time Management Techniques_All Rules.pptx
EXT.-EDU-809-EXTENSION-POLICY-AND-GOALS-.pptx
Ad

Radicalization in the Workplace

  • 2. HILLARD HEINTZE © 2016 | Protecting What Matters2 ORIGINS: WHY THE EXECUTIVE CONCERN? "We are witnessing, in my view, a change in the nature of mass shootings in the U.S. No longer are they solely defined by a single, isolated aggrieved shooter but a shooter or shooters embedded in, justified by and potentially supported by an ongoing ideological framework.” ALAN J. LIPMAN, FOUNDER AND EXECUTIVE DIRECTOR THE CENTER FOR THE STUDY OF VIOLENCE IN WASHINGTON D.C.
  • 3. HILLARD HEINTZE © 2016 | Protecting What Matters3 ORIGINS: WHY THE SPOTLIGHT NOW? A marked rise in executive concerns Increasing focus on workplace violence and active shooter prevention Recent terror events in Europe and Turkey – and in the U.S., from San Bernardino to the Navy Yard Media spin, opinion and frenzy Politics and the U.S. election process Complexity of the issues – from privacy to religious expression Overlapping executive responsibilities – Security, HR, Legal, IT, Law Enforcement
  • 4. 4 Radicalization cuts across many areas So where exactly does threatening behavior related to radicalization fit in? HILLARD HEINTZE © 2016 | Protecting What Matters • Workplace violence • Substance abuse • Hostile work environment • Criminal activity • Inappropriate behavior • Sexual harassment
  • 5. HILLARD HEINTZE © 2016 | Protecting What Matters5 DEFINITION Radicalization “Radicalization is a personal process in which individuals adopt extreme political, social and/or religious ideals and aspirations, and where the attainment of particular goals justifies the use of indiscriminate violence. It is both a mental and emotional process that prepares and motivates an individual to pursue violent behavior.” Source: A. S. Wilner and C. J. Dubouloz, "Homegrown terrorism and transformative learning: an interdisciplinary approach to understanding radicalization," GlobalChange, Peace & Security (formerly Pacifica Review: Peace, Security & Global Change) 22:1 (2010): 38.
  • 6. HILLARD HEINTZE © 2016 | Protecting What Matters6 What Security and HR leaders are saying • “Duty of care” obligates companies to keep the employee population fully informed regarding ALL potentially threatening behaviors and, conversely, behaviors that may require tolerance in the workplace as well as reporting. • Radicalization falls into a subset of workplace violence behaviors. • Awareness training should be provided to employees regarding radicalization and orientations. • Accommodations for particular non- threatening belief practices should be considered and established.
  • 7. HILLARD HEINTZE © 2016 | Protecting What Matters7 The spectrum of potential behavior that could be “radicalized” should be broadened to include: • Gun rights • Abortion • Racism • Animal rights • Religious extremism • Ultra right-wing activism • Ultra left-wing activism • Environmental activism
  • 8. HILLARD HEINTZE © 2016 | Protecting What Matters8 ACCOUNTABILITY: OVERLAPPING AREAS OF RESPONSIBILITY CATEGORIES • Workplace Violence • Hostile Work Environment • Criminal Behavior • Cyber • Sexual Harassment • Substance Abuse • Inappropriate Behavior STAKEHOLDERS • Security • HR • Legal • IT • Law Enforcement ACTIONS • Document • Employee Assistance Program • Confront • Report to Law Enforcement • Counsel • Personal Action
  • 9. HILLARD HEINTZE © 2016 | Protecting What Matters9 MANIFESTATION IN THE WORKPLACE Radicalization can manifest itself as: • A violent, aggressive, selfless act conducted on a random target, with encouragement, enabling and logistical support from an identifiable segment of an organization that has hijacked or bastardized a goal. • The result of an openly stated goal or purpose of an organization or body.
  • 10. HILLARD HEINTZE © 2016 | Protecting What Matters10 PATHS TO RADICALIZATION Disciples may be radicalized through exposure to: • A narrow indoctrination path. • No outside contrary opinions. • The inevitability of a catastrophic event as the likely outcome.
  • 11. 11 Violent Extremist Person who advocates, is engaged in or is preparing to engage in ideologically motivated terrorist activities (including providing support to terrorism) to further political or social objectives promoted by a foreign terrorist organization (FTO). THREATS: THREE TYPES OF ATTACKERS HILLARD HEINTZE © 2016 | Protecting What Matters
  • 12. 12 Homegrown Violent Extremist (HVE) THREATS: THREE TYPES OF ATTACKERS HILLARD HEINTZE © 2016 | Protecting What Matters A U.S. person who was once assimilated into, but who has rejected the cultural values, beliefs and environment of the U.S. in favor of a violent extremist ideology. He or she is “U.S. radicalized” and intends to commit terrorism inside the U.S. without direct support or direction from a foreign terrorist organization.
  • 13. HILLARD HEINTZE © 2016 | Protecting What Matters13 THREATS: THREE TYPES OF ATTACKERS Domestic Terrorist Person who engages in unlawful acts of violence to intimidate civilian populations or attempt to influence domestic policy (as opposed to furthering the aims of a foreign terrorist organization) without direction from or influence by a foreign actor. Examples include acts by racist, supremacist, antigovernment, environmental, animal rights or other single-issue extremist groups or movements.
  • 14. 14 A sampling of lessons the U.S. intelligence community is gleaning from recent events • Radicalization increases the likelihood of violence. • Individuals and groups follow different paths to violence. • Multiple factors indicate why some choose terrorist violence. • A one-factor approach to intervention will fail. • Factor importance varies across cases and circumstances. • Some factors serve as catalysts for others and can trigger a chain of events. INSIGHTS: FUNDAMENTAL PRINCIPLES OF RADICALIZATION HILLARD HEINTZE © 2016 | Protecting What Matters
  • 15. HILLARD HEINTZE © 2016 | Protecting What Matters15 DRIVERS: FACTORS THAT INCREASE AN INDIVIDUAL’S VULNERABILITY Personal Factors Group Factors Community Factors Sociopolitical Factors Ideological Factors • Psychological • Demographic backgrounds • Personal history • Social networks • Family and peer groups • Group dynamics • Alienation • Marginalization • Diaspora relationships with home country • Collective grievances • Foreign policy • External events • Appeal of justifying narrative • Charismatic ideologues
  • 16. HILLARD HEINTZE © 2016 | Protecting What Matters16 MOBILIZATION A Portfolio of Indicators Other Indicators (Sampling) • Preparing and disseminating a last will, martyrdom video or statement. • Seeking help from family and friends to enable travel to join terrorist groups overseas. • Planning or attempting to travel to a conflict zone to fight with or support an FTO. • Seeking religious or political justification for violent acts. • Employing counter- surveillance techniques. • Establishing suspicious travel patterns. • Deleting social media and other online accounts to avoid tracking by law enforcement. • Suspicious acquisition of maps or blueprints.
  • 17. HILLARD HEINTZE © 2016 | Protecting What Matters17 DEFINITION Workplace Insider Threats “A current or former employee, contractor or other business partner who has or had access to an organization’s network, system or data and intentionally exceeded or misused that access in a manner negatively affected the confidentiality, integrity, or availability of the organization’s information or information systems.” DHS NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION CENTER
  • 18. HILLARD HEINTZE © 2016 | Protecting What Matters18 DEFINITION Insider Threat “The insider threat to critical infrastructure is one or more individuals with the access and/or insider knowledge of a company, organization or enterprise that would allow them to exploit the vulnerabilities of that entity’s security, systems, services, products, or facilities with intent to cause harm.” National Infrastructure Advisory Council in their publication, “The Insider Treat to U.S. Critical Infrastructures”
  • 19. 19 INSIDER THREAT MITIGATION HILLARD HEINTZE © 2016 | Protecting What Matters Detect anomalies as early as possible and investigate before assets, data or personnel are compromised Look beyond cyber security to include potential insider threats related to: • Fraud • Workplace violence • Information technology (IT) sabotage • Intellectual property and research and development theft
  • 20. HILLARD HEINTZE © 2016 | Protecting What Matters20 INSIDER THREATS ARE SELDOM IMPULSIVE ACTS Look for the warning signs as insiders move along a threat continuum from idea to action • Demonstrating a change in behavior or attitude • Violating company policy • Arriving early or staying late • Showing undue interest in information not relevant to job • Attempting access into physical areas not related to job
  • 21. 21 LEARN THE WARNING SIGNS OF INSIDER THREAT HILLARD HEINTZE © 2016 | Protecting What Matters Companies must establish guidelines on recognizing threat indicators based on behavioral-based techniques 1. Train employees to recognize and report behavioral indicators exhibited by fellow employees or business partners. 2. Ensure training includes how to identify the characteristics of insiders at risk of becoming a threat.
  • 22. HILLARD HEINTZE © 2016 | Protecting What Matters22 CHARACTERISTICS OF INSIDERS AT RISK OF BECOMING A THREAT • Introversion • Greed/financial need • Vulnerability to blackmail • Compulsive and destructive behavior • Rebellious, passive- aggressive • Ethical “flexibility” • Reduced loyalty • Entitlement – narcissism (ego/self-image) • Minimize their mistakes and faults • Inability to assume responsibility • Intolerance to criticism • Self-perceived value exceeds performance • Lack of empathy • Predisposition towards law enforcement • Pattern of frustration and disappointment • History of managing crisis ineffectively
  • 23. HILLARD HEINTZE © 2016 | Protecting What Matters23 FREE ONLINE COURSES DHS/FEMA independent study course, “Protecting Critical Infrastructure Against Insider Threats” (IS-915) http://training.fema.gov/ Department of Defense (DoD), “Insider Threat Awareness Course” http://cdsetrain.dtic.mil/itawareness/
  • 24. HILLARD HEINTZE © 2016 | Protecting What Matters24 KEY ISSUES Starting the Conversation 4. Determine the scope of monitoring, recording and reporting on employee online behavior. 5. Establish the parameters of access. 6. Communicate the consequences of abuse to employees. 1. Engage external partners – law enforcement, media, community services and religious experts. 2. Understand the role of technology, social media and internet usage. 3. Identify technology vendors that provide monitoring services.
  • 25. HILLARD HEINTZE © 2016 | Protecting What Matters25 FOR FURTHER INFORMATION Howard Fisher, Esq. Vice President, Strategic Relationships howard.fisher@hillardheintze.com 312.229.9882 30 South Wacker Drive, Suite 1400 Chicago, Illinois 60606 312.869.8500