During a routine security audit in your organization, it was discovered that an employee from the research and development department has been transmitting confidential product designs to a competitor. Which type of threat actor is most likely involved in this scenario?
Organized crime
Insider threat
Nation-state
Unskilled attacker