This document discusses insider threat trends and programs. It outlines different types of insiders like unintentional, exploited, external insiders, and malicious insiders. It discusses common motives for insider threats like money, ideology, coercion, ego, and disgruntlement. Potential risk indicators for insider threat activities are listed like attempting to bypass security or expressing conflicting loyalties. Case studies of insiders exhibiting concerning behaviors are presented anonymously. Common times for insider data theft are outlined as within 30 days of leaving a company. Methods for detecting and mitigating insider threats through training, monitoring, and reporting programs are listed.