Managing the risks presented by Insider Threats is, in large part, founded on historical counterintelligence (CI) precepts. This presentation updates “old school” CI practices for the digital age and demonstrates how these proven maxims may be translated into controls to enhance your cybersecurity posture.