M. H. Coggins & Associates uses behavioral analysis techniques to inform workforce risk analysis processes and to implement proactive threat prevention models. Our focus is to build capacity to detect the earliest indicators of insider threat, internal fraud behavior, workplace violence potential, and intellectual property theft.
Our team provides training and consultation to corporate clients, financial institutions, and security analytics firms around the design of holistic, whole-person threat detection models. We consider human behavior and motivation, to provide context to security monitoring data. To formulate insider threat detection strategies, we apply our collective subject matter expertise in conducting criminal, internal affairs, and background investigations; identifying, assessing, and managing threats and violent behavior; and, managing sensitive employee relations and internal affairs matters involving employee misconduct.
Our team provides training and consultation to corporate clients, financial institutions, and security analytics firms around the design of holistic, whole-person threat detection models. We consider human behavior and motivation, to provide context to security monitoring data. To formulate insider threat detection strategies, we apply our collective subject matter expertise in conducting criminal, internal affairs, and background investigations; identifying, assessing, and managing threats and violent behavior; and, managing sensitive employee relations and internal affairs matters involving employee misconduct.
SERVICE OFFERINGS
- Training and consultation on the psychology of fraud and indicators of fraud behavior
- Developing curriculum and providing instruction related to fraud prevention and insider threat detection
- Consultation to identify organization-specific workforce indicators of potentially concerning behavior
- Advising to determine data sources that should be considered as part of a threat assessment protocol
- Training on discernable behaviors that can be used to assess risk for insider threat
- Individual case assessments and personal interviews to evaluate risk
- Planning strategies to monitor subject behaviors, communications, activities, and social media interactions
- Policy review and development
- Training to differentiate motivations and behaviors associated with intentional malicious activity vs. inadvertent or negligent misconduct