📜 Governance · Career Framework

How This Framework Is Governed

This page describes how the Insider Threat Analyst Career Framework is authored, how changes are made, how KSAs are managed, and how you can contribute. Transparency is the point.

Authorship & authority

This framework is authored and maintained by a single practitioner, informed by peer review from the FS-ISAC Insider Threat Working Group and contributions from the broader insider threat community. It is not a committee product, a vendor initiative, or a regulatory standard. It is a practitioner tool built by practitioners.

Community contributions — resource suggestions, KSA refinements, corrections, new content — are welcomed, evaluated, and credited. But contributions don't automatically become part of the framework. Every change goes through editorial review to ensure consistency with the framework's scope, structure, and quality standard.

KSA stability

Practitioners, hiring managers, and training programs need to know that when they reference a KSA by its ID, it means what they think it means. The framework makes these commitments:

Example: In v0.5.1, A-SYNTH01 was refined from "Ability to synthesize multi-source behavioral and technical data into risk assessments" to "Ability to synthesize multi-source data — endpoint, cloud, HR, physical, identity — into behavioral risk assessments." Same scope, improved specificity. Credited to Bidemi Ologunde, documented in the changelog.

Relationship to NICE

The framework's KSA model extends the NICE Framework (SP 800-181r1) Insider Threat Analyst work role. It does not replace it.

Custom KSAs are informed practitioner consensus, not regulatory requirements. Organizations should adapt them to their context, sector, and risk profile.

How changes happen today

The framework is in active development. Changes follow this process:

There is no formal RFC process today. The framework has a single editor who makes final calls informed by practitioner feedback. This works at the current scale. If it stops working, the process will evolve.

Update cadence

Current pace: Weekly updates during active development. Community suggestions are reviewed as they arrive and incorporated into the next release when appropriate.

Future pace: Monthly releases once the framework stabilizes. All changes documented in the changelog regardless of cadence.

The goal is to be nimble early — respond to feedback quickly, iterate visibly, and show contributors that their input matters — without letting maintenance become unsustainable.

AI/ML and emerging threats

This domain is moving faster than governance processes can keep up with. The framework includes an AI/ML emerging cluster with a single KSA today (K-AI01). This is deliberately minimal. The intersection of AI/ML and insider threat is evolving across at least three dimensions simultaneously:
  • AI as detection tool — LLM-assisted triage, automated timeline generation, behavioral anomaly detection (K-AI01 today)
  • AI as threat vector — autonomous agents with delegated access to internal systems, APIs, and collaboration platforms that bypass traditional behavioral baselines. These are insider-like access holders with no human behavioral patterns to anchor detection against.
  • AI as attack enabler — GenAI-assisted social engineering, deepfake-based impersonation, LLM-powered data exfiltration

New KSAs will be added to this cluster as the field matures and practitioner consensus develops around what competencies are required. This is the governance model in action: identify the domain, document it, solicit input, and formalize KSAs when the practice catches up to the threat. If you work in this space, we want to hear from you.

Where this is headed

If this framework grows into a community-maintained standard — used across organizations, cited in job postings, referenced in training programs — a more formal governance process will be needed. That might include:

That process doesn't exist yet because it would be premature. The framework has a changelog, credited contributors, and stable KSA IDs. That's the right level of governance for where it is today.

Where insider threat fits

Insider threat programs don't exist in a vacuum. The field overlaps with several adjacent disciplines, and understanding these relationships helps practitioners communicate their value — especially to leadership who may be hearing different terminology from analysts, vendors, and consultants.

This framework focuses on the insider threat analyst role specifically, but many KSAs — particularly in behavioral science, case management, and stakeholder engagement — transfer directly across these disciplines. Career paths frequently cross between them.

Community & ecosystem

This framework exists in a growing ecosystem of insider threat practitioner resources. The full directory — organized by standards bodies, communities of practice, and research/vendor intelligence — lives on the framework page's Resources tab. Key communities include:

If you represent a practitioner community, research group, or industry body that should be listed, get in touch.

Contribute

This framework improves when practitioners engage with it. Here's what's most valuable:

We especially welcome input from: thought leaders, researchers, and practitioners working in insider threat, insider risk management, behavioral science, counterintelligence, and adjacent disciplines. If your work has informed how organizations detect, investigate, or prevent insider threats, there's a place for it here. This is a community project — the more perspectives that shape it, the more useful it becomes.

Submit a suggestion →  or  hello@insiderthreatanalyst.com
Helpful? Thanks!