Insider threat continues to be one of the most difficult cybersecurity threat vector to be detected by current technologies. Most organizations are applying standard technology based practices to detect unusual network activity. While there have been significant advances in intrusion detection systems (IDS) as well as security incident and event management solutions (SIEM). These technologies fail to take into consideration the human security aspect in computer use and network activity; since insider threats are human. External influencers impact how an end-user interacts with colleagues and organizational resources. Influencers such as a major life event, changes in organizational polices and structure, along with unusual technical activity analysis, maybe able to identify at risk employees, allowing upper management or other organizational units to intervene before a malicious cybersecurity insider threat event occurs or mitigate it quickly, if initiated.