The creation of an effective insider threat cyber ecosystem is a significant challenge and requires a robust and mature
cybersecurity governance process, which effectively incorporates:
enterprise risk management, threat modeling and the enterprise security architecture, which should be a manifestation of
understanding the integrated risks and selected mitigated controls, through the addition of new or reinforced security access layers from the network perimeter through to the data layer.