Belfort AdvisoryLens
Insider Risk Assessment · Beta 2026

See the real state of your insider risk program.

An adaptive insider risk maturity assessment for leadership and domain owners. It measures whether the program works in practice, not just whether one exists on paper.

0%of organizations find insider detection harder than external threats, up from 37% the year before
0questions across 9 axes, 28 modules and 5 adaptive tiers
0regulatory articles mapped across NIS2, DORA, GDPR, ISO 27001, NIST CSF
21%of organizations have integrated culture and wellbeing signals into their insider risk program

No structured starting point

Most organizations know insider risk matters. Few have a diagnostic that covers the full program, not just the detection layer.

Fragmented ownership

Insider risk spans Security, HR, Legal, and IT. Each function sees a slice. Nobody has the full picture.

No board language

A maturity score alone does not move budget. Translating program gaps into financial exposure is the missing step.

Regulatory pressure, no roadmap

NIS2, DORA, and GDPR require proportionate, documented programs. Most organizations do not know where they stand.

What Makes It Different

Not a questionnaire. A diagnostic.

Six structural differences that change what the results are worth.

Measures the whole program

Nine axes, from governance to wellbeing. A detection-only score describes one layer of a nine-layer program.

Evidence confidence alongside every score

Claim vs. proof. A parallel confidence score runs with every maturity score, so results are defensible, not self-certified.

Questions go to the right people

The CISO does not answer DPO questions. Each module routes to the function that can actually answer it.

Delivers the board number

Annual Loss Expectancy per scenario, calibrated to sector and size. The output that moves budget conversations.

A program profile, not just a level

The output shows the shape of the program: which axes are strong, which are weak, and what that means for investment.

Vendor-neutral by design

Belfort Advisory has no monitoring product. Every recommendation is grounded in maturity evidence, not vendor margin.

What It Measures

Nine axes. The full program.

Most assessments invest in one or two. Belfort Lens measures all nine, including two that no other assessment addresses.

G

Governance

Executive ownership, charter, risk appetite, board engagement

E

Execution

Operational delivery, program cadence, accountability

T

Technology

DLP, identity, access management, detection, data controls

L

Legal & Privacy

Proportionality, lawful basis, DPIA, regulatory alignment

H

Human Factors

Screening, culture, awareness, workforce lifecycle

V

Visibility

Logging coverage, behavioral analytics, alert triage

R

Response

Incident management, forensics, containment, recovery

F

Friction

Whether your controls create the conditions they aim to prevent

W

Wellbeing

Psychological safety, burnout signals, workforce trust

How It Works

Adaptive. Cross-functional. As deep as needed.

Questions route to the right people. Depth adjusts to the organization's readiness.

T0~10 min

Scoping

Sector, size, regulatory exposure, and risk priorities shape what follows

T115–20 min

Rapid Benchmark

Strategic snapshot across all nine axes. Initial findings and program profile produced here

T228 modules

Deep Dive

Routed to domain owners. Each module goes to the accountable function

T3Triggered

Specialist

Auto-surfaces when a domain scores below threshold. Depth only where warranted

CISO / Security

Program governance, threat model, detection, response

Legal / DPO

Monitoring lawfulness, proportionality, investigation governance

HR / CHRO

Culture, wellbeing, lifecycle, awareness

IT / IAM

Access management, data classification, technical coverage

Evidence & Confidence

What you say you do.
What you can prove you do.

A confidence score runs alongside every maturity score. High maturity with low evidence is a finding.

A typical self-assessment

Answers taken at face value
No way to separate claimed capability from proven capability
Not defensible to auditors, regulators, or boards
Overstates capability in the areas regulators check first

Belfort Lens

Evidence hints guide every answer. Structured request for proof, not opinion.
Submitted evidence validated for freshness, scope, traceability, and independence
Confidence score surfaces alongside every result
Produces an audit-defensible chain of proof, not a self-certified score

Evidence Confidence Score (example)

00.73 / 1.001.0
What You Receive

Board-ready outputs. One assessment.

Outputs scale from the rapid benchmark through to the detailed assessment.

Executive Summary

Board-calibrated narrative. Exportable PDF or DOCX. Four key findings, not a technical appendix.

9-Axis Deep Dive

Declared vs. evidence-verified scores for each axis. Radar visualization of the program's shape.

Risk Quantification

Annual Loss Expectancy per insider risk scenario, calibrated to sector and size. The board number.

Action Plan

Vendor-neutral recommendations with effort, cost range, and time-to-impact. Filtered to your risk appetite.

Jurisdiction Readiness

Per-country legal posture for monitoring activities across EU, UK, and global profiles.

Program Profile

The shape of the program, what that pattern means, and what will actually move it.

What It Looks Like

A common fact base, not another static maturity score.

Illustrative views with fictitious data. The goal is to give internal teams a shared picture that drives decisions.

Belfort Lens — Board report with maturity scores, risk roadmap, and evidence confidence

Board Report & Program Profile

Maturity scores, evidence confidence, financial exposure estimate, and risk roadmap — in one view.

Belfort Lens — Action plan with prioritised recommendations and investment guidance

Action Plan & Capability View

Prioritised recommendations, effort estimates, and assessment patterns at investment level.

Who It Is For

Built for programs ready to be looked at honestly.

CISOs and security leaders

Building or stress-testing an insider risk program, with outputs that work at board level.

Risk and compliance leaders

Demonstrating insider risk governance to a board or regulator, backed by evidence rather than self-assessment.

Legal and DPO teams

Validating that monitoring is proportionate and legally defensible under NIS2, DORA, and GDPR enforcement.

Organizations under pressure

M&A, workforce change, regulatory audit, or a recent incident. Any trigger requiring an honest view.

Get Started

Start with the rapid benchmark.

Start with the rapid benchmark. Detailed assessment available. No vendor agenda.

Belfort Advisory · Request Belfort Lens access

© 2026 Belfort Advisory BV. All rights reserved.

Belfort AdvisoryLens

Insider Risk. Practitioner-built.

Belfort Advisory works with organizations building and maturing insider risk programs. Assessment, advisory, and program design grounded in practitioner experience, not product sales.

belfort-advisory.com →
01

Practitioner-built, not vendor-backed

The methodology comes from experience building insider risk programs, not from a product roadmap. Recommendations are vendor-neutral because Belfort has no monitoring technology to sell.

02

Built for European regulatory reality

NIS2, DORA, and GDPR enforcement of employee monitoring are all increasing. The Legal axis and jurisdictional outputs exist because proportionality is now a compliance requirement.

03

The full program, not a slice of it

Insider risk is a people problem with technical dimensions, not the other way around. Belfort Lens measures the full scope in a single adaptive engagement.