Where Psychology meets technology

We live in an interconnected world. Every minute and second of the day, more and more people are connected with each other. Signpost Six focuses on the human in cyber security. We believe psychology is an integral part of our digitized world. Online and offline. People, processes and technology cannot be separated and therefore Signpost Six works together with technology partners to ensure seamless integration.

Signpost Six supports individuals, governments and corporations internationally with behavioural (cyber) security issues and opportunities. We provide cyber security programmes for behavioural change, insider risk management programmes, and behavioural threat assessments and screenings. We offer this through (case and organisational) consultancy, trainings, workshops and larger bespoke e-learning programmes.

Solutions

The advent of computers and the Internet notably changed our lives on many dimensions society by decentralising it whilst democratising access to information. Although a great change for the technical evolution, it has also brought on significant risks, including the way we respond to both risks and their actualised forms.

Access to and availability of information are now heavily facilitated by the Internet and all at very high speed. The flip side of this is the increased vulnerability to information leaks or other threats, whether intentionally or unintentionally. Signpost Six addresses these new risks in its solutions, all from a human perspective, to increase organisational defenses against cyber attacks, manage insider risks within organisations and assess and manage cyber threats such as bullying, stalking and harassment.

Insider Risk Management

The recognition of insider risks in companies and organisations is growing now outside defences are becoming more mature.

Read more
Anonymous threat assessments & advisory

A behavioural threat assessment is a structured process used to identify, assess, and manage the risk of future, planned malicious acts.

Read more
Cyber Secure Behaviours

To mitigate acts of social engineering by outsiders and minimise unintentional insider incidents cyber secure behaviours are imperative.

Read more

Projects & case studies

In this section we outline some typical cases that Signpost Six provides support on. With these cases we aim to explain the products and services that we use and offer to assess threats and manage the underlying risks – whether directed to organisations, the public or individuals.

News

Article: The cyber security waterbed effect: insider risks on the increase.

The geopolitical tensions in the world, especially between China, Russia and the United States, have emphasized the targeting of Western secrets. With organizations still investing heavily to prevent external cyber intrusions, skilled threat actors are seeing increased value in targeting insiders who can bypass controls. We believe the consequences will be severe. This special issue […]

E-book: Chinese espionage operations and tactics by Nick Eftimiades

At this crucial moment in time when US-China tensions and espionage are daily news, Nick Eftimiades has written yet another unique work on Chinese espionage operations and tactics. This long awaited monograph carefully describes how China recruits the 'whole of society’ to conduct espionage and how businesses put party above profit. Based on extensive and [...]

Signpost Six proudly announces its very own ONLINE insider risk management training programme

Curious to learn more? Register your interest below and we will reach out to you as soon as possible!

Events

There are no upcoming events at this time.
View All Events

Insights

Glossary

Explanation of terminology used in behavioural intelligence.

Read more

Downloads

Articles & Reports on Behavioural Intelligence

Read more

Links

Read further on the field of behavioural intelligence.

Read more

About

OWNER AND NETWORK OF ASSOCIATES

Elsine van OsCEO & Founder

Clinical Psychologist and Intelligence and Security Expert.

Learn more
Dr. Eric ShawInsider Risk Management

Clinical Psychologist and former intelligence officer on insider issues while helping organizations manage insider risk. 

Learn more
Roland VergeerCyber Threat Assessment

Roland Vergeer has over 20 years of professional experience in the field of cybersecurity, intelligence, research and digital investigations.

Learn more
Jobien BerkouwerCriminal profiling

Jobien is specialised in criminal profiling with a focus on stalking and combines her extensive law enforcement experience with relevant training.

Learn more
Glenn SchoenSecurity & Crisis Management

CEO of Boardroom@Crisis BV and a longtime security and crisis management advisor with a specialization in terrorism.

Learn more
Alex KrijgerGeopolitical Security Risks

Alex Krijger is specialised in managing complex business related international government affairs issues and geopolitical security risks

Learn more
An GaiserInvestigative interviewing

An Gaiser is an expert in investigative interviewing with many years of in-depth experience in complex and high stake interviews

Learn more
Rene BoekelRisk Management & Investigations

Rene Boekel is an expert in international risk management and investigations in the domains of (non) compliance, fraud, security and regulatory issues

Learn more
Rene Marchal
René Marchal(Cyber) Security and Risk expert

René Marchal is a senior (cyber) security & crisis management executive with 35+ years of (international) experience in both public and corporate environments.

Learn more
A hyperconnected world

We live in a hyperconnected world. Every minute and second of the day, more and more people are connected with each other. Signpost Six focuses on the human in cyber security. We believe psychology is an integral part of our digitized world. Online and offline. People, processes and technology cannot be separated and therefore Signpost Six works together with technology partners to ensure seamless integration.Signpost Six supports individuals, governments and corporations internationally with behavioural (cyber) security issues and opportunities. We provide cyber security programmes for behavioural change, insider risk management programmes, and behavioural threat assessments and screenings. We offer this through (case and organisational) consultancy, trainings, workshops and larger bespoke e-learning programmes.

Hague Security Delta

University of Twente

Dtex systems

Contact

We'd love to hear from you
Sign up to our newsletter
[newsletter_form button_label="Go!"]