By Need

By Industry

By Function

Webinar Replay

Insider Threats: The Hidden Risk Inside Your Organization

Insider threats are one of the most overlooked risks facing organizations today.

While most security strategies focus on external attackers, insiders can bypass even the strongest defenses. In November 2025, CrowdStrike confirmed an employee shared internal information with hackers, proving that trusted access can quickly become a serious liability.

In this session, our experts examine why insider threats are increasing, where traditional security falls short, and what organizations can do to reduce risk without slowing the business.

Our experts explore: 

  • The real impact of insider threats on your organization
  • Why perimeter based security is no longer enough
  • How HR, IT, and Security must work together
  • Practical ways to reduce insider risk

Interested in a consultative evaluation with our security experts?

Jay Martin

Chief Information Security Officer

Jay Martin is the Chief Information Security Officer (CISO) and Vice President of Cybersecurity & Risk at Blue Mantis, where he leads the charge in securing enterprise ecosystems, building business resilience, and navigating the evolving digital threat landscape. With over 25 years of experience across IT, cybersecurity, and risk management, Jay bridges technical complexity with business strategy — helping organizations not just survive but thrive securely.​

At Blue Mantis, Jay architects the cybersecurity vision across internal operations and external service delivery, aligning technical defenses with real-world business imperatives. He oversees cybersecurity posture across seven practice areas while empowering clients to achieve measurable, resilient growth in an increasingly hostile digital world.​

Jay’s leadership was recently showcased on the global stage when he helped lead security operations for a major city that hosted Super Bowl LIX, safeguarding one of the world’s most high-profile events against cyber threats.​​

Before joining Blue Mantis, Jay co-founded Service Catalyst and held senior leadership roles at Dunkin’ Brands International, InteQ Corporation, and Hewlett-Packard. Throughout his career, he has built security programs from the ground up, led major business continuity initiatives, and guided enterprises through regulatory compliance with precision and foresight.​​

Jay has held the Certified Information Security Manager (CISM) credential and is an active voice in cybersecurity leadership forums. His passion: translating risk into resilience, complexity into clarity, and cybersecurity into a business enabler — not a barrier.​​

When Jay speaks, he brings a rare combination of technical insight, executive pragmatism, and forward-looking vision — making cybersecurity approachable, strategic, and mission-critical for today’s leaders.

Molly Anderson

Vice President, Legal and People & Culture

Molly leads the HR and Legal teams at Blue Mantis. She joined Blue Mantis in November of 2024 and is responsible for centralizing the HR and Legal functions while shaping the company’s culture to reflect the Team mentality.

Her communicative, empathetic approach develops a welcoming environment. Molly brings years of expertise from her tenure at Foresite Cybersecurity, Inc., where she served as Director of HR and a Senior Security Consultant for seven years. Prior to that she served as Legal Counsel at Insulet Corporation (a medical device company) and Zensar Technologies (an infrastructure management company). Molly holds a B.A. in International Relations and French from Colgate University and a J.D. from Western New England University School of Law. She is licensed to practice law in Massachusetts and Connecticut. A proud wife and mother, Molly is active in her community where she mentors young people beginning their careers. 

Insider Threats Webinar FAQ

We start by sitting down with the client to map out their strategy and requirements. This includes:

  • Understanding their industry and organizational type.
  • Assessing potential exposure and current technology/security operations.
  • Identifying strengths and gaps in their existing setup.

From there:

  • This process involves lightweight discussions and workshops rather than heavy assessments or long-term engagements.
  • We use a flexible framework to build a package of discrete services that address gaps and help improve maturity.
  • The model is consumption-based, allowing adjustments over time as needs change.

Blue Mantis stands out in several ways:

True Partnership: We aim to be embedded in your program, not just a monitoring service.

Beyond MSSP: We go further than typical Managed Security Service Providers by incorporating GRC (Governance, Risk, and Compliance) as a service.

Hands-on Support: Unlike many MDR providers who only alert you, we can remediate issues directly (e.g., patch systems, adjust configurations).

Broad Capabilities: In addition to cybersecurity, we offer managed services for digital operations, cloud, networking, AI, data enablement, and business intelligence.

Dedicated Advisor: Each account has a Cybersecurity Maturity Advisor to guide improvements and bring in professional services when needed.

No problem! The Mantis Protect framework is designed to integrate with your existing tools:

  • We can even build custom API integrations if needed.
  • It consists of discrete services that can be bundled flexibly.
  • If you use Microsoft Defender (for email, endpoints, cloud), we can leverage those tools without requiring a platform change.
  • Our open integration framework taps into your current platforms, collects telemetry, and performs SOC functions without replacing tools.

Blue Mantis Protect

Related Resources

Blue Mantis Protect Blog

Mantis Protect FAQ for CISOs

Mantis Protect Behind the Shield eBook

Stay Connected and Sign Up for Communications

Abstract background decoration.