Insider threat has the potential to cause greater damage to an organisation than any other threat source. The statistics from several studies have found clear links between insider threats and exploitable weaknesses in organisation’s security management procedures.
The result has seen damages in excess of $100,000 for 53% of companies, and over $1 million for 12% of companies in 2017 alone and 74% of companies believe that they are still vulnerable.
This course will provide your organisation’s executives, managers and human resources personnel with knowledge and skills they need to manage the risk associated with the insider threat
Benefits
- Understanding the threat from insiders through real-world examples.
- Identifying potential insider threats and creating plans to mitigate the risks they present.
- Understanding how security vetting can reduce the likelihood of having insider threats.
- Knowing why incident reporting is important for creating more robust risk and security planning.
- Being aware of the importance and benefits of providing security training for all staff members.
Pre Requisites
- None
Who Should Attend
- Organisational executives
- Security management staff
- Human resources personnel
- Managers and supervisors at all levels
Course Outline
Participants will be guided through the following topic areas:
- Defining The Insider Problem – Providing knowledge of what constitutes an insider and the statistical data of impacts they can have on an organisation.
- Insider Threat – Identifying the types of insider threats and signs to look for to identify “at risk” persons.
- Personnel Security – Understanding the importance of personnel security in combating the threat from insiders.
- Identifying Vulnerabilities in Security – Knowing how to identify vulnerabilities in security that can be targeted by insiders and the damage that can be caused.
- Vetting and Ongoing Suitability – Understanding the importance of onboarding/vetting and maintaining suitability of new and potential staff.
- Annual Security Awareness Training – The significance of security training and how ensuring all staff complete it will assist in reducing risks.
- Incident Reporting – Providing information on how incident reporting can enable businesses to develop more robust security strategies and methods of reporting incidents.
- Separating Staff – Distinguishing strategies for separating staff from a business group or terminating employment utilising best practice procedures to reduce the risk of damage.
Student Learning Outcomes
After this course, you will be able to:
Define insider threat and provide examples of “at risk individuals”.
Understand how to reduce the prevalence of at-risk individuals using appropriate onboarding and vetting procedures.
Understand the need for and implementing an annual security awareness training package and implementing an incident reporting and management system.
Create procedures that enable the smooth transfer from or separation of at-risk individuals from IT systems and workspaces without impacting on the continuity of the businesses strategic and operational goals.
Teaching Strategies & Approaches to Learning
This course will provide real-world examples of insider threats to enhance the participant’s skills and experience in dealing with insider threats.
These examples will be provided through the use of case studies, audio-visual snippets and quizzes and will offer best practice guidance for the identification and management of insider threat.
Although this self-paced online course is to be completed individually and may require the participant to re-read course material to be able to adequately answer questions throughout the course, post course discussions and regular review of course material is encouraged and will ensure that procedures are implemented and maintained in the most effective and efficient manner
Course Logistics
Location or delivery mechanisms – This course is a self-paced online course with online assessment; however, private in-house courses can be run over an agreed number of days by experienced security risk consultants through negotiation.
Duration – The online course will take approximately 2 hours to complete.
Assessment – Although this training package is a not pass/ fail it is suggested that participants complete all questionnaires to their fullest potential to ensure that they get the most benefit for themselves and the company.
Course registration – Register by calling Agilient on 1300 341 692 or emailing us on securityinsights@agilient.com.au.