Protecting Your Organization from Insider Threats

  • Overview
  • Course Content
Overview

Protecting Your Organization from Insider Threats

Course Description

In today’s information-centric environment, protecting organizational data from deliberate or unintentional disclosure is paramount. While most organizations focus on protecting their critical assets and data from external threats, they may overlook the threats originating from inside their walls. Insiders have the potential to cause severe financial and reputational harm to an organization. This course, Protecting Your Organization from Insider Threats, will provide a foundational understanding of the insider threat and how an organization can protect itself from that threat. Discussions and activities will provide you with the tools and knowledge to design and implement an effective insider threat program tailored to your organization.

Course Content

OVERVIEW

  • Insider threat landscape
  • Insider threat actors
  • Case studies

INSIDER THREAT PROGRAMS

  • Regulatory requirements
  • Keys to success
  • Common challenges

MEASURING INSIDER THREAT RISK

  • Qualitative measurements
  • Quantitative measurements
  • Workshop

CONTROLS

  • Technical controls
  • Physical and administrative controls
  • Workshop

DESIGNING AN INSIDER THREAT PROGRAM

  • Measuring program effectiveness
  • Insider threat program roadmap
  • Threat program frameworks
  • Workshop

Session Details

  • Special Discounts: Georgia Tech Research Institute (GTRI) employees are eligible to receive a discount.  If you are a GTRI employee, please go to the Organizational Development website and look for the coupon code under GT Professional Development. Review coupon instructions for more information.

Who Should Attend

This course is designed for all levels of an organization including chief information security officers, chief information security officers, information security professionals, risk officers, physical security professionals, human resources professionals, program managers, and others responsible for identifying and mitigating the insider threat for their organization.

Coding boot camp professional working on laptop

What You Will Learn

  • The insider threat landscape
  • Insider threat incident case studies
  • Insider threat countermeasures
  • Technical, physical, and administrative controls
  • Insider threat program design
  • Insider threat risk and program effectiveness measurement
Cybersecurity professional working on computer

How You Will Benefit

  • Learn how to protect your organization from potential insider threats.

  • Gain the tools and knowledge required to construct a tailored insider threat program for your organization built on deterrence, detection, and mitigation techniques.

  • Taught by Experts in the Field icon
    Taught by Experts in the Field
  • Grow Your Professional Network icon
    Grow Your Professional Network

The course schedule was well-structured with a mix of lectures, class discussions, and hands-on exercises led by knowledgeable and engaging instructors.

- Abe Kani
President

TRAIN AT YOUR LOCATION

We enable employers to provide specialized, on-location training on their own timetables. Our world-renowned experts can create unique content that meets your employees' specific needs. We also have the ability to deliver courses via web conferencing or on-demand online videos. For 15 or more students, it is more cost-effective for us to come to you.

  • Save Money
  • Flexible Schedule
  • Group Training
  • Customize Content
  • On-Site Training
  • Earn a Certificate
Learn More