top of page


We pride ourselves on leveraging decades of experience in private industry, national security and government, especially in research and development to provide a systematic approach to support organizational Insider Threat requirements. Our Team of experts are trained to design, implement and maintain enterprise-wide Insider Threat programs, including policy development and oversight. Clients include U.S. Department of Defense service components.

Many of our methodologies to prevent, deter, detect and mitigate come from our strategic partnership with Carnegie Mellon University’s Software Engineering Institute (SEI) CERT Partner Network.  Our core competencies in Insider Threat defense include:

  • NISPOM 2 Insider Threat Program Development

  • Certified SEI CERT Insider Threat Vulnerability Assessments 

  • Advanced Analytics Technical Controls

  • Continuous Evaluation and Monitoring

  • System Integrity and Penetration Testing

  • Incident Response Plans

  • Training and Awareness

  • Behavioral Observations

  • Physical Security Measures and Assessments

Insider Threat Fingernail.png



Software Engineering Institute (SEI), Carnegie Mellon University, is the leader in software engineering and cyber security since 1984. The SEI works closely with defense and government organization, industry and academia to improve the security and resilience of computer systems and networks. As an SEI Partner, SANCORP provides security consultation that assists organizations on improving their insider threat software engineering capabilities and to prepare for, respond to, and recover from attacks.

SANCORP supplies insider threat program managers with the concepts and practices necessary for measuring and managing their organizations' insider threat risk.

Examples of support are:

  • Insider threat definitions, issues, and types

  • Insider threat prevention, detection, and mitigation strategies

  • Requirements for a formal insider threat program

  • Confidential reporting procedures and mechanisms

  • How to identify issues affecting your insider threat risk

  • How to design and implement tactical countermeasures

  • How to formulate a strategic action plan for long-term risk mitigation

Thompson Reutgers.png
bottom of page