Join our Cybersecurity Awareness Month webinar!

Register now

When the Threat Comes From Inside, Trust Is the First Casualty

Most security programs are built to keep attackers out. Breach of Faith exposes a harder reality: insiders—malicious, negligent, or compromised—can bypass your strongest external controls. This CyberEd.io interactive plunges leaders, SOC teams, HR, and legal into the gray zone where privacy, forensics, and employment law collide with real-time risk.

Breach of Faith: The scenario

The exercise opens with an ambiguous set of signals—nothing “on fire,” but everything uneasy.

Participants must distinguish coincidence from conspiracy while navigating the guardrails around insider investigations.

Early injects (Stage 1 – Suspicion):

  • DLP Alerts: Multiple transfers of “Restricted” CAD files to a personal cloud storage domain outside whitelist.
  • UEBA Anomaly: A senior engineer downloads 10x their normal volume from a Git repo at 02:13 local time.
  • Badge/VPN Mismatch: Physical access badge shows “home,” but VPN logs place the user inside a production subnet.
  • O365/Google Audit: Mass mailbox search queries for “offer,” “confidential,” and competitor names.
  • Endpoint Artifacts: Recently mounted USB mass-storage device with autorun disabled/log scrub attempts.

Escalation injects (Stage 2 – Attribution vs. Action):

  • HR Flag: Employee is in exit process (accepted a competitor’s offer); two weeks remain.
  • Phishing/Account Compromise Clue: MFA fatigue prompts on the same account the night before anomalies started.
  • ServiceNow/Jira: Tickets requesting temporary admin rights approved by a peer during off hours.
  • Finance/Procurement Trail: Unapproved SaaS trial for a “sync” tool used to mirror folders to a personal tenant.

Crisis injects (Stage 3 – Decision Point):

  • External Counsel Guidance: “Preserve evidence; avoid actions that constitute constructive dismissal.”
  • Privacy Officer Note: Jurisdiction requires proportional monitoring; intrusive surveillance risks regulatory exposure.
  • Product Team Alert: A competitor demoed a feature unusually similar to an unreleased design.
  • Insider Communication: The employee emails HR alleging retaliation—whistleblower protection may apply.

Participants must choose, in real time: do they ghost-monitor to build an airtight case, or intervene now to stop potential exfiltration? Who informs whom, when—and how?

Learning outcomes

Breach of Faith develops skills organizations rarely practice under pressure:

Evidence-driven triage

Correlate DLP/UEBA, endpoint, identity, badge, and SaaS logs into a defensible narrative.

Proportional response & due process

Balance monitoring and containment with privacy, labor, and whistleblower protections.

Chain of custody discipline

Forensically sound acquisition (disk, memory, cloud artifacts) aligned with counsel’s guidance.

Segregation of duties

Keep HR/legal decisions separate from SOC actions; no “fishing expeditions.”

Risk-framed communication

Brief executives with fact patterns, impact scenarios, and options—no speculation.

Remediation without retaliation

Remove access (JIT/JEA rollback, key rotation) without creating legal exposure.

Enterprise value

Insider incidents are multidisciplinary; this simulation shows whether your organization can act as one team:

  • Program Validation: Tests your insider threat playbook (not just your IR plan) across HR, Legal, Security, and IT Ops.
  • Control Assurance: Exercises least privilege, JIT access, DLP policies, CASB, and data classification in a live scenario.
  • Governance Clarity: Establishes who authorizes enhanced monitoring, account suspension, or device seizure, and under what threshold of evidence.
  • Regulatory Readiness: Practices documentation standards that withstand regulator review or litigation.
  • Culture & Trust: Demonstrates how to address internal risk without chilling normal work—a key leadership signal.

Delivery models

CyberEd.io offers Breach of Faith in flexible formats:

On-site workshop:

Live facilitation with inject packets, mock interviews, and counsel participation.

Remote simulation:

Secure platform delivering artifacts (logs, emails, tickets) with decision dashboards.

Hybrid:

Executive/HR/legal in room; SOC/DFIR remote, reflecting real operational dynamics.

Custom tailoring:

Aligns to your jurisdiction, policies, tooling, and data classifications.

Post-exercise enablement

  • After-Action Report: Evidence reviewed, decisions taken, missed opportunities, and legal risk notes.
  • Policy & Playbook Updates: Insider threat SOPs; monitoring thresholds; investigative checklists; counsel notification triggers.
  • Control Improvements: Data egress guardrails, JIT/JEA, PAM reviews, code repo protections, SaaS governance.
  • Training Pathways: Follow-on labs for DLP tuning, UEBA baselining, forensic imaging, and interview techniques.