Belfort AdvisoryLens
Insider Risk Assessment

See the real state of your insider risk program.

An adaptive insider risk maturity assessment for leadership and domain owners. It measures whether the program works in practice, not just whether one exists on paper.

Detection gapInsider detection remains harder for many organizations than external-threat monitoring, especially when ownership is fragmented.
0questions across 9 axes, 28 modules and 5 adaptive tiers
0framework and control references mapped across legal, security, and resilience expectations
Human signalsPeople, culture, burnout and wellbeing signals determine your actual risk exposure. We integrate them into the assessment.

No structured starting point

Most organizations know insider risk matters. Few have a diagnostic that covers the full program, not just the detection layer.

Fragmented ownership

Insider risk spans Security, HR, Legal, and IT. Each function sees a slice. Nobody has the full picture.

No board language

A maturity score alone does not move budget. Translating program gaps into financial exposure is the missing step.

Growing pressure, no roadmap

Boards, auditors, clients, and internal stakeholders expect a documented program. Most organizations still lack a clear picture of where they actually stand.

What Makes It Different

Not a questionnaire. A diagnostic.

Six structural differences that change what the results are worth.

Measures the whole program

Nine axes, from governance to wellbeing. A detection-only score describes one layer of a nine-layer program.

Evidence confidence alongside every score

Claim vs. proof. A parallel confidence score runs with every maturity score, so results are defensible, not self-certified.

Questions go to the right people

The CISO does not answer DPO questions. Each module routes to the function that can actually answer it.

Delivers the board number

Annual Loss Expectancy per scenario, calibrated to sector and size. The output that moves budget conversations.

A program profile, not just a level

The output shows the shape of the program: which axes are strong, which are weak, and what that means for investment.

Independent recommendations

Belfort Advisory does not sell monitoring software. Recommendations are shaped by maturity evidence and operating reality.

What It Measures

Nine axes. The full program.

Most assessments invest in one or two. Belfort Lens measures all nine, including two that no other assessment addresses.

G

Governance

Executive ownership, charter, risk appetite, board engagement

E

Execution

Operational delivery, program cadence, accountability

T

Technology

DLP, identity, access management, detection, data controls

L

Legal & Ethics

Proportionality, lawful basis, defensibility, governance alignment, whistleblowing and integrity

H

Human Factors

Screening, culture, awareness, workforce lifecycle

V

Visibility

Logging coverage, behavioral analytics, alert triage

R

Response

Incident management, forensics, containment, recovery

F

Friction

Whether your controls create the conditions they aim to prevent

W

Wellbeing

Psychological safety, burnout signals, workforce trust

How It Works

Structured, cross-functional, and deliberately thorough.

The benchmark is a practical starting point. The broader assessment still requires time, evidence, and input from the people who actually run the program.

T0~10 min

Scoping

Sector, size, operating model, and risk priorities shape what follows

T115–20 min

Rapid Benchmark

Strategic snapshot across all nine axes, typically completed in one focused sitting by a senior sponsor

T228 modules

Deep Dive

Routed to domain owners. Expect multiple contributors, evidence gathering, and more time investment

T3Triggered

Specialist

Auto-surfaces when a domain scores below threshold. Depth only where warranted

CISO / Security

Program governance, threat model, detection, response

Legal / DPO

Monitoring lawfulness, proportionality, investigation governance

HR / CHRO

Culture, wellbeing, lifecycle, awareness

IT / IAM

Access management, data classification, technical coverage

Evidence & Confidence

What you say you do. What you can prove you do.

A confidence score runs alongside every maturity score. High maturity with low evidence is a finding.

A typical self-assessment

Answers taken at face value
No way to separate claimed capability from proven capability
Difficult to defend to auditors, leadership, or challenge functions
Often overstates capability in the areas that matter most under stress

Belfort Lens

Evidence hints guide every answer. Structured request for proof, not opinion.
Submitted evidence validated for freshness, scope, traceability, and independence
Confidence score surfaces alongside every result
Produces an audit-defensible chain of proof, not a self-certified score

Evidence Confidence Score (example)

00.73 / 1.001.0
What You Receive

Board-ready outputs. One assessment.

The benchmark produces an initial results set. The full assessment adds cross-functional depth, stronger evidence, and more precise actions.

Executive Summary

Decision-ready narrative with the main findings, implications, and next-step priorities. Exportable as PDF or DOCX.

9-Axis Deep Dive

Declared vs. evidence-verified scores for each axis. Radar visualization of the program's shape.

Risk Quantification

Annual Loss Expectancy per insider risk scenario, calibrated to sector and size. The board number.

Action Plan

Vendor-neutral recommendations with effort, cost range, and time-to-impact. Filtered to your risk appetite.

Jurisdiction Readiness

Per-country legal posture for monitoring activities across EU, UK, and global profiles.

Program Profile

The shape of the program, what that pattern means, and what will actually move it.

Who It Is For

Built for programs ready to be looked at honestly.

CISOs and security leaders

Building or stress-testing an insider risk program, with outputs that work at board level.

Risk, compliance and integrity leaders

Building a clearer evidence-backed view for leadership, oversight, and internal challenge rather than relying on self-assessment alone.

Legal and DPO teams

Validating that monitoring is proportionate and legally defensible under NIS2, DORA, and GDPR enforcement.

Organizations under pressure

M&A, workforce change, internal incidents, or heightened scrutiny. Best suited to teams willing to involve the right stakeholders rather than treat this as a lightweight survey.

Get Started

Start with a scoped benchmark.

The benchmark can be completed in one focused session. The broader assessment requires real time from the right stakeholders and should be treated as program work, not a five-minute quiz.

Belfort Advisory · Request Belfort Lens access

© 2026 Belfort Advisory BV. All rights reserved.

Belfort AdvisoryLens

Insider Risk. Practitioner-built.

Belfort Advisory works with organizations building and maturing insider risk programs. Assessment, advisory, and program design grounded in practitioner experience, not product sales.

belfort-advisory.com →
01

Assessment design grounded in practice

The methodology comes from experience building insider risk programs, not from a software roadmap. Recommendations are made from the evidence and the operating model in front of you.

02

Built for complex operating reality

The Legal axis and jurisdictional outputs exist because insider risk programs have to work across governance, privacy, workforce trust, and operational decision-making at the same time.

03

The full program, not a slice of it

Insider risk is a people problem with technical dimensions, not the other way around. Belfort Lens measures the full scope in a single adaptive engagement.