
An adaptive insider risk maturity assessment for leadership and domain owners. It measures whether the program works in practice, not just whether one exists on paper.
Program maturity across 9 axes
Most organizations know insider risk matters. Few have a diagnostic that covers the full program, not just the detection layer.
Insider risk spans Security, HR, Legal, and IT. Each function sees a slice. Nobody has the full picture.
A maturity score alone does not move budget. Translating program gaps into financial exposure is the missing step.
Boards, auditors, clients, and internal stakeholders expect a documented program. Most organizations still lack a clear picture of where they actually stand.

Six structural differences that change what the results are worth.
Nine axes, from governance to wellbeing. A detection-only score describes one layer of a nine-layer program.
Claim vs. proof. A parallel confidence score runs with every maturity score, so results are defensible, not self-certified.
The CISO does not answer DPO questions. Each module routes to the function that can actually answer it.
Annual Loss Expectancy per scenario, calibrated to sector and size. The output that moves budget conversations.
The output shows the shape of the program: which axes are strong, which are weak, and what that means for investment.
Belfort Advisory does not sell monitoring software. Recommendations are shaped by maturity evidence and operating reality.
Most assessments invest in one or two. Belfort Lens measures all nine, including two that no other assessment addresses.
Executive ownership, charter, risk appetite, board engagement
Operational delivery, program cadence, accountability
DLP, identity, access management, detection, data controls
Proportionality, lawful basis, defensibility, governance alignment, whistleblowing and integrity
Screening, culture, awareness, workforce lifecycle
Logging coverage, behavioral analytics, alert triage
Incident management, forensics, containment, recovery
Whether your controls create the conditions they aim to prevent
Psychological safety, burnout signals, workforce trust

The benchmark is a practical starting point. The broader assessment still requires time, evidence, and input from the people who actually run the program.
Sector, size, operating model, and risk priorities shape what follows
Strategic snapshot across all nine axes, typically completed in one focused sitting by a senior sponsor
Routed to domain owners. Expect multiple contributors, evidence gathering, and more time investment
Auto-surfaces when a domain scores below threshold. Depth only where warranted
CISO / Security
Program governance, threat model, detection, response
Legal / DPO
Monitoring lawfulness, proportionality, investigation governance
HR / CHRO
Culture, wellbeing, lifecycle, awareness
IT / IAM
Access management, data classification, technical coverage

A confidence score runs alongside every maturity score. High maturity with low evidence is a finding.
A typical self-assessment
Belfort Lens
Evidence Confidence Score (example)
The benchmark produces an initial results set. The full assessment adds cross-functional depth, stronger evidence, and more precise actions.
Decision-ready narrative with the main findings, implications, and next-step priorities. Exportable as PDF or DOCX.
Declared vs. evidence-verified scores for each axis. Radar visualization of the program's shape.
Annual Loss Expectancy per insider risk scenario, calibrated to sector and size. The board number.
Vendor-neutral recommendations with effort, cost range, and time-to-impact. Filtered to your risk appetite.
Per-country legal posture for monitoring activities across EU, UK, and global profiles.
The shape of the program, what that pattern means, and what will actually move it.
Building or stress-testing an insider risk program, with outputs that work at board level.
Building a clearer evidence-backed view for leadership, oversight, and internal challenge rather than relying on self-assessment alone.
Validating that monitoring is proportionate and legally defensible under NIS2, DORA, and GDPR enforcement.
M&A, workforce change, internal incidents, or heightened scrutiny. Best suited to teams willing to involve the right stakeholders rather than treat this as a lightweight survey.

The benchmark can be completed in one focused session. The broader assessment requires real time from the right stakeholders and should be treated as program work, not a five-minute quiz.
Belfort Advisory · Request Belfort Lens access
© 2026 Belfort Advisory BV. All rights reserved.

Insider Risk. Practitioner-built.
Belfort Advisory works with organizations building and maturing insider risk programs. Assessment, advisory, and program design grounded in practitioner experience, not product sales.
belfort-advisory.com →The methodology comes from experience building insider risk programs, not from a software roadmap. Recommendations are made from the evidence and the operating model in front of you.
The Legal axis and jurisdictional outputs exist because insider risk programs have to work across governance, privacy, workforce trust, and operational decision-making at the same time.
Insider risk is a people problem with technical dimensions, not the other way around. Belfort Lens measures the full scope in a single adaptive engagement.