Part II: Modules 9-16
Timing and registration for Part II: Modules 9-16 will be opened in September 2021
Insider Threat and Theft of Intellectual Property
Many businesses don't understand the Crown Jewels they hold, where they are located, what they are worth, and how best to protect them. The threat by competitors and, specifically nation-states, is very real and this course shows you how to understand what you have and how best to protect it.
Insider Threat and Travel
If you ever travel for work such as to attend conferences or business meetings, your cyber hygiene and physical security awareness leave you and your organization vulnerable. In this course, you will learn how to travel smarter, recognizing where you can improve your operational security and reduce risk.
Insider Threat and Technical Controls
All organizations should have a strong understanding how physical and technical controls can limit the threats that insiders pose. There are general industry standards that will help add layers of security to your day-to-day operations.
Insider Threat Mitigation and Best Practices
This course is where you can find best practices related to Insider Threat. We provide consistent, relevant, and detailed examples of ways to improve everything from cyber hygiene to personal security practices. Processes for when and how to report and action concerns of a potential Insider Threat are addressed.
Insider Threat Related to Contractors and Trusted Business Partners
An insider risk program is not complete unless an organization looks beyond their own staff to understand the associated personnel - including contractors and trusted business partners - that have access to the company assets. This training walks through considerations for onboarding, managing and offboarding these individuals in a way that maintains the integrity of the insider risk program.
Managing Staff during COVID-19
COVID-19 brings with it the necessity to focus on management skills which support the transformation of a workforce that is separated not just by physical proximity, but often time zones and technical resources. Making sure your organization's team members are engaged, feel connected and effective in their roles, and understanding the indicators of compromise that lead to sabotage, theft of IP or espionage, is the focus of this training program.
In this course you will learn the difference between industrial espionage, corporate espionage, and competitive intelligence. Methods of corporate espionage, the legal landscape, and the xx between organized crime, insider threat, cyber security, foreign intelligence, and intellectual property are all discussed.
Employee Lifecycle Management to Address Insider Threat
An employee’s lifecycle encompasses several stages throughout their career. This begins with recruitment and concludes with resignation, retirement, or termination. This course addresses how organizations can establish a lifecycle program in order to give employees consistency throughout their careers and teaches you how to prevent insider threats as a result. It also provides a framework to understand important interdependencies, touchpoints, interactions, and gaps in insider protection strategies.