top of page

DEVELOPING AND IMPLEMENTING AN INSIDER THREAT PROGRAM

A Proactive, Behavioral, and Risk Managed Approach

COURSE DESCRIPTION

This two-day comprehensive program is designed to provide a stepwise development of the critical components in an Insider Threat Program using modern organizational theory, analytic techniques and measures.  Using a Security Return on Investment (ROI) approach, learn how to evolve your current security program into a converged management structure that will identify and deter individuals posing both violent and non-violent threats.
 
Learn the skills and procedures required to identify factors critical to shaping a comprehensive insider threat program. Real case studies are used to explain how counterproductive work behavior can reveal early signs of a potential insider threat. The program will examine Potential Risk Indicators and how organizations can best be structured to detect and deter the insider threat.
 
We’ll provide you with the information needed to evolve your current security program into a converged, proactive management structure that will identify and deter individuals who pose both violent and non-violent threats.

TARGET AUDIENCE

This program is fully compatible with both Government and Industry guidelines for 2018 and geared toward any security professional responsible for the implementation of the Insider Threat Program in accordance with Executive Order (EO) 13587, National Insider Threat Policy (NITP) and the NISPOM Conforming Change 2.

WHY TAKE THE COURSE

  • Understand the basic requirements for designing, developing, coordinating, and continuously evaluating an integrated insider threat

  • Learn the methodologies used to identify insiders, individual motivators and corporate triggers.

  • Recognize the utility of different operational structures and collaborative standards in combating the insider

  • Examine behavioral risk indicators and identify organizational and situational triggers for the violent and non-violent insider

  • Review the laws, regulations, civil liberties, and policies, collecting, storing, and evaluating data relevant to insider threat

  • Learn mitigation techniques for internal alerting, reporting, collecting, storing, and evaluating data relevant to insider threat indicators.

    • Learn the psychometric approach to building metrics; how to analyze existing measures; and how to re-purpose existing metrics from across the organization

bottom of page