HR and IT don't rehearse together
Insider investigations require HR, legal, and IT to move in lock step. Most organizations only discover the handoff gaps during a live case.
Rehearse how HR, legal, IT, and security coordinate when the threat is coming from inside the organization.
The Problem
Insider investigations require HR, legal, and IT to move in lock step. Most organizations only discover the handoff gaps during a live case.
Decommissioning access for a departing employee is complicated by shared credentials, SaaS accounts, and third-party tools.
Under time pressure, teams take shortcuts that undermine legal and HR processes later.
Scenario Overview
Scenarios surface plausible insider signals — large data transfers, after-hours access, HR escalations — and push the team through investigation, preservation, and disposition.
Default roles include HR partner, legal counsel, security lead, IT/identity administrator, and an executive sponsor.
Measure behavioral indicator recognition, cross-functional coordination, legal and HR engagement, and access revocation procedures.
A departing employee's badge access logs show after-hours entry to a restricted area. IT flags large file transfers to personal cloud storage over the past week. HR has also received a complaint from a coworker.
Every run produces a scored report mapped to recognized frameworks. Download the sample PDF to see the format teams get after a live Insider Threat exercise.
FAQ
Scenarios emphasize confidentiality — reports track whether the team preserved need-to-know boundaries during the investigation.
Yes. Scenarios use synthetic personas so HR can participate fully without referencing real employees.
Scenarios can anchor on employees, contractors, or third-party vendor staff using the scenario theme field.
Ready to run a Insider Threat exercise? View pricing, browse other exercise types, or try a free demo run.