Course Overview
Learning Objectives
Learning Objectives
1- How to develop, implement, manage, evaluate and optimize an Insider Threat Program.
2- How to identify / recognize Insider Threat behavioral indicators of concern to the Insider Threat Program.
3 - Identify the critical roles, responsibilities and collaboration required by key stakeholders to support the Insider Threat Program.
4 - Identify and develop the essential documentation that is required for an Insider Threat Program.
4- Identify the essential data sources (Non-Technical, Technical) that will provide support for Insider Threat detection and investigations.
5- Assess and evaluate weaknesses / vulnerabilities in the organizations security foundations (Non-Technical, Technical) that could hinder the organizations Insider Risk Management efforts.
6- Assess and evaluate an Insider Threat Program, identify gaps and provide cost effective strategies to optimize the program.
7- Assess and evaluate the capabilities of the organization network security tools and user activity monitoring tools, identify gaps and provide recommendations.
8- How to develop an Insider Threat Reporting, Response, Investigations & Case Management Framework.
5 - Develop and implement an Insider Threat Awareness and Reporting Program.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):