** The terms ‘insider risk’ and ‘insider threat’ are often used interchangeably, even though it could be argued that technically they are quite different. However, we won’t unpack that debate here. For the purposes of this note we will assume the terms mean the same thing.*

What’s an “insider”? An insider is
any person who has or had authorized access to or knowledge of an organization’s resources, including personnel, facilities, information, equipment, networks, and systems.
or
any person who has, or previously had, authorized access to or knowledge of the organization’s resources, including people, processes, information, technology, and facilities.
It is generally accepted that there are two types of insider threats: malicious and non-malicious insider threats.
“2 out of 3 insider threat incidents are caused by negligence” (Swiss cyber institute)
For the most part, Human Risk Management, Security Awareness or Security Culture efforts (whichever of these monikers and approaches you choose to adopt) has the potential to primarily affect non-malicious insider threats.
The non-malicious insider threats break down into three categories:
The team at MITRE do a great job of explaining it all here.
MITRE defines three types of non-malicious insider threats, and understanding them helps avoid using a one-size-fits-all approach to security: