
An adaptive insider risk maturity assessment for leadership and domain owners. It measures whether the program works in practice, not just whether one exists on paper.
Program maturity across 9 axes
Most organizations know insider risk matters. Few have a diagnostic that covers the full program, not just the detection layer.
Insider risk spans Security, HR, Legal, and IT. Each function sees a slice. Nobody has the full picture.
A maturity score alone does not move budget. Translating program gaps into financial exposure is the missing step.
NIS2, DORA, and GDPR require proportionate, documented programs. Most organizations do not know where they stand.

Six structural differences that change what the results are worth.
Nine axes, from governance to wellbeing. A detection-only score describes one layer of a nine-layer program.
Claim vs. proof. A parallel confidence score runs with every maturity score, so results are defensible, not self-certified.
The CISO does not answer DPO questions. Each module routes to the function that can actually answer it.
Annual Loss Expectancy per scenario, calibrated to sector and size. The output that moves budget conversations.
The output shows the shape of the program: which axes are strong, which are weak, and what that means for investment.
Belfort Advisory has no monitoring product. Every recommendation is grounded in maturity evidence, not vendor margin.
Most assessments invest in one or two. Belfort Lens measures all nine, including two that no other assessment addresses.
Executive ownership, charter, risk appetite, board engagement
Operational delivery, program cadence, accountability
DLP, identity, access management, detection, data controls
Proportionality, lawful basis, DPIA, regulatory alignment
Screening, culture, awareness, workforce lifecycle
Logging coverage, behavioral analytics, alert triage
Incident management, forensics, containment, recovery
Whether your controls create the conditions they aim to prevent
Psychological safety, burnout signals, workforce trust

Questions route to the right people. Depth adjusts to the organization's readiness.
Sector, size, regulatory exposure, and risk priorities shape what follows
Strategic snapshot across all nine axes. Initial findings and program profile produced here
Routed to domain owners. Each module goes to the accountable function
Auto-surfaces when a domain scores below threshold. Depth only where warranted
CISO / Security
Program governance, threat model, detection, response
Legal / DPO
Monitoring lawfulness, proportionality, investigation governance
HR / CHRO
Culture, wellbeing, lifecycle, awareness
IT / IAM
Access management, data classification, technical coverage

A confidence score runs alongside every maturity score. High maturity with low evidence is a finding.
A typical self-assessment
Belfort Lens
Evidence Confidence Score (example)
Outputs scale from the rapid benchmark through to the detailed assessment.
Board-calibrated narrative. Exportable PDF or DOCX. Four key findings, not a technical appendix.
Declared vs. evidence-verified scores for each axis. Radar visualization of the program's shape.
Annual Loss Expectancy per insider risk scenario, calibrated to sector and size. The board number.
Vendor-neutral recommendations with effort, cost range, and time-to-impact. Filtered to your risk appetite.
Per-country legal posture for monitoring activities across EU, UK, and global profiles.
The shape of the program, what that pattern means, and what will actually move it.

Illustrative views with fictitious data. The goal is to give internal teams a shared picture that drives decisions.

Maturity scores, evidence confidence, financial exposure estimate, and risk roadmap — in one view.

Prioritised recommendations, effort estimates, and assessment patterns at investment level.
Building or stress-testing an insider risk program, with outputs that work at board level.
Demonstrating insider risk governance to a board or regulator, backed by evidence rather than self-assessment.
Validating that monitoring is proportionate and legally defensible under NIS2, DORA, and GDPR enforcement.
M&A, workforce change, regulatory audit, or a recent incident. Any trigger requiring an honest view.

Start with the rapid benchmark. Detailed assessment available. No vendor agenda.
Belfort Advisory · Request Belfort Lens access
© 2026 Belfort Advisory BV. All rights reserved.

Insider Risk. Practitioner-built.
Belfort Advisory works with organizations building and maturing insider risk programs. Assessment, advisory, and program design grounded in practitioner experience, not product sales.
belfort-advisory.com →The methodology comes from experience building insider risk programs, not from a product roadmap. Recommendations are vendor-neutral because Belfort has no monitoring technology to sell.
NIS2, DORA, and GDPR enforcement of employee monitoring are all increasing. The Legal axis and jurisdictional outputs exist because proportionality is now a compliance requirement.
Insider risk is a people problem with technical dimensions, not the other way around. Belfort Lens measures the full scope in a single adaptive engagement.