Continuing in the spirit of National Insider Threat Awareness Month (NITAM), the InfraGardNCR chapter has publicly posted an excellent Vantage Point blog outlining a basic framework for building, reviewing, and strengthening insider threat programs. In the post, Jim Stone highlights nine fundamental steps for any size and type of organization to follow. Additionally, this weeks’ CERT National Insider Threat Center (NITC) Insider Threat Blog covers the most commonly affected devices by insider threat incidents. The NITC recently expanded their taxonomy to classify the devices that insiders affect. The post discusses the types of devices affected by insider threat incidents and how they impact insider risk management and incident response. Understanding the devices most impacted by insider threats provides insight for asset prioritization for monitoring and analysis and which devices to check during or after an insider attack.