Behavioral Evaluation Using Social Science Approaches: Comprehensive assessments of insider and behavioral risk.
I use established behavioral models and structured judgment methods to evaluate potential threats.
Using pathway-to-violence models and insider threat behavioral indicators to assess concerning changes in behavior.
Applying structured judgment tools to determine whether stressors and grievances may escalate into violence or insider risk.
Structured Responses to Leadership Inquiries (RFIs): Concise, evidence-based answers to critical security questions.
I prepare structured, research-informed responses that help leaders interpret behavior and risk.
Leadership may ask, “Is this employee’s behavior consistent with insider threat risk, or just workplace stress?” I provide a structured, evidence-backed analysis.
HR or security submits an RFI such as, “What are the behavioral implications of this incident?” I prepare a brief with risk levels and monitoring recommendations.
I examine HR, IT, and security information to identify behavioral patterns that may indicate insider risk.
Reviewing IT logs, HR data, and security reports to detect patterns linked to insider threats.
Pulling insights from a variety of data sources – attendance records, performance reviews, and complaints – to build a comprehensive behavioral profile.
Advancing New Programs and Training Initiatives: Evidence-based frameworks and practical tools for leaders and analysts.
I design training and advise programs on incorporating behavioral science into threat management systems.
Designing training about early behavioral red flags.
Advising insider threat programs to integrate behavioral science indicators into data-driven monitoring systems.
Integrating Intelligence with Behavioral Assessment: Well-rounded evaluations that combine multiple information streams.
I bring together behavioral indicators, organizational context, and intelligence reporting for more accurate assessments.
Integrating interview data, digital activity monitoring, and security reports into comprehensive assessments.
Cross-referencing traditional intelligence sources (e.g., clearance adjudication notes) with observed workplace behaviors to strengthen risk evaluation.