Course 100-174

Insider Threat Management

Course Length:
2 Days
Accreditation:
1.6 CEUs / 16 PDHs
Cost:
$1,750 USD
Course Description:

Insider threat management is critical for protecting people, assets, and information from risks posed by individuals with authorized access who could intentionally or unintentionally cause harm. They are characterized as potential disruption caused by individuals with authorized access who misuse that access to harm an organization’s people, property, or information. These threats can include employees, contractors, vendors, partners, or students in academic settings. Malicious insiders often exhibit identifiable patterns of behavior, planning, and preparation before committing acts such as sabotage, theft, process corruption, or IT/industrial control system attacks. In industrial, petrochemical, or academic environments handling sensitive or hazardous materials, these threats can have severe consequences, including safety incidents, environmental impacts, and business disruptions.

This course provides the foundation for establishing a phased insider threat program, covering identification, management, and ongoing monitoring. Participants will learn to assess risks, define team roles and governance, integrate insider threat management with cybersecurity and operational procedures, and apply tools like the Critical Facility Security Insider Threat Management (CF-SIM) system. Case studies of real-world insider incidents will be used to illustrate risks and highlight preventive measures.

Course Benefits:
  • Understand the definition and scope of insider threats in industrial and academic environments
  • Identify behaviors and risk factors that may indicate a potential insider threat
  • Develop a functional insider threat management program within your organization
  • Learn to audit the effectiveness of insider threat and personnel management systems
  • Track and assess key roles, risk factors, and potential threats
  • Implement safeguards and preventive measures to mitigate insider risks
  • Integrate insider threat management with cyber, operational, and governance systems
  • Use case studies to understand practical applications and lessons learned
Get in Touch
Ready to kick off your next project? We are too.