Source: https://www.ekransystem.com/sites/default/files/file_resources/how-to-build-an-insider-threat-program.pdf