Insider Threat Management in Federal Workplaces: A Review of Technical and Policy Framework

Authors

  • Ahmad Ahmad Masters in Cybersecurity and Information Assurance, College of Information Technology, Western Governors University, Salt Lake, Utah, USA Author
  • Nurudeen Agbonoga Master of Science - MS in Computer Engineering, University of Texas at Dallas, USA Author
  • Abimbola Otun Master of Science - MS, Engineering/Industrial Management, Nottingham Trent University Author

DOI:

https://doi.org/10.70589/JRTCSE.2025.13.5.2

Keywords:

Insider Threat, Threat Management, Threat Landscape, National Security, Human Behavior

Abstract

Insider threats remain one of the most persistent and damaging risks to national security, particularly in federal workplaces where access to sensitive information and critical systems is routine. These threats encompass both malicious insiders who intentionally exfiltrate data or sabotage operations, and unintentional actors whose negligence or error compromises security. Despite significant advancements in cybersecurity, insider incidents remain under-researched and under-mitigated, primarily due to the complexity of human behavior, organizational dynamics, and technological vulnerabilities. This article proposes a comprehensive framework for insider threat management that integrates advanced technical monitoring systems, artificial intelligence (AI)-driven analytics, and robust policy measures to safeguard federal workplaces. By combining lessons learned from high-profile incidents, current policy landscapes, and technological innovation, this framework offers a blueprint for federal agencies seeking to balance security, privacy, and operational efficiency.

References

ASIS International. (2023, April 17). The state of insider threat initiatives 10 years after Snowden. Security Management Magazine. ASIS International

Cybersecurity Insiders. (2024). 2024 Insider Threat Report. GuruculIBM

Gurucul. (2024, October 23). Understanding the risks and mitigation of insider threats. Gurucul

Harvard Law Review. (2020, Jan 10). In re U.S. Office of Personnel Management data security breach litigation. Harvard Law Review

IBM / Ponemon Institute. (2025). Cost of a Data Breach Report 2025. IBMTeramind -

ITPro. (2025). AI means cyber teams are rethinking their approach to insider threats. IT Pro

Mazzarolo, G., & Jurcut, A. D. (2019). Insider threats in Cyber Security: The enemy within the gates. arXiv. arXiv

Sanyal, S., Shelat, A., & Gupta, A. (2010). New frontiers of network security: The threat within. arXiv. arXiv

Securonix. (2025). Edward Snowden – The Ultimate Insider Threat. Securonix

TechRadar. (2025). AI set to supercharge insider threats. TechRadar

Wired. (2013). NSA whistleblower: The ultimate insider attack. WIRED

Wired. (2015). Why the OPM breach is such a security and privacy debacle. WIRED

Wired. (2016). Inside the cyberattack that shocked the US government. WIRED

Wikipedia. (2025). Office of Personnel Management data breach.

Downloads

How to Cite

Ahmad Ahmad, Nurudeen Agbonoga, & Abimbola Otun. (2025). Insider Threat Management in Federal Workplaces: A Review of Technical and Policy Framework. JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), 13(5), 9-20. https://doi.org/10.70589/JRTCSE.2025.13.5.2