Insider Threat Detection Report

1. Report Summary

2. Incident Overview

3. Indicators of Insider Threat

4. Detection Details

5. Involved Individuals

Name Role/Position User ID Department

6. Actions Taken

7. Recommendations

8. Appendices / Attachments