Insider Threat Program Manager - Implementation and Operation

Heinz College

How long?

  • 3 days
  • online

What are the topics?

Heinz College


Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Finance

Finance is an integral and most important component of any business, so everyone needs to improve their competence in this area. Finance courses will ...


Comprehensive course analysis

Unbiased reviews from past participants
Global companies alumni of this course worked for
Positions of participants who took this course
Countries where most past participants are from
Individual needs analysis

Who should attend

  • Insider Threat Program Team Members
  • Insider Threat Program Managers

About the course

This three day course builds upon the initial concepts presented in the prerequisite courses Insider Threat Overview: Preventing, Detecting, and Responding to Insider Threats and Building an Insider Threat Program. The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods to develop, implement, and operate program components.

This training is based upon the research of the CERT Insider Threat Center of the Software Engineering Institute. The CERT Insider Threat Center has been researching this problem since 2001 in partnership with the U.S. Department of Defense (DoD), the Department of Homeland Security, the U.S. Secret Service, other federal agencies, the intelligence community, private industry, academia, and the vendor community. This training course supports organizations implementing and managing insider threat detection and prevention programs based on various government mandates or guidance including: Presidential Executive Order 13587, the National Insider Threat Policy and Minimum Standards, and proposed changes set forth in the National Industrial Security Program Operating Manual (NISPOM).

This course is also recommended for anyone pursing the certificates for the Insider Threat Vulnerability Assessor or Insider Threat Program Evaluator, but is not required.


At the completion of the course, learners will be able to:

  • Identify critical assets and protection schemes
  • Coordinate a cross-organizational team to help develop and implement the Insider Threat Program
  • Develop a framework for their Insider Threat Program
  • Identify methods to gain management support and sponsorship
  • Plan the implementation for their Insider Threat Program
  • Identify organizational policies and processes that require enhancement to accommodate insider threat components
  • Identify data sources and priorities for data collection
  • Identify infrastructure changes and enhancements necessary for implementing and supporting an Insider Threat Program
  • Outline operational considerations and requirements need to implement the program
  • Build policies and processes to help hire the right staff, develop an organizational culture of security
  • Improve organizational security awareness training
  • Identify training competencies for insider threat team staff


The course covers topics such as:

  • Building the Insider Threat Program Framework
  • Developing an enterprise-wide approach and interdisciplinary project team
  • Building or enhancing policies and processes to include insider threat program considerations
  • Identifying critical asset and protection needs
  • Identifying risks to assets from insiders and enhancing any risk management program to take into account risks from insiders
  • Enhancing organizational training and awareness programs to include insider threat
  • Enhancing organizational infrastructures to support the Insider Threat Program by determining what defenses are needed, and where enhancements are necessary
  • Building the data collection and analysis function for both technical and behavioral data
  • Identifying data sources and priorities
  • Building a Roadmap for implementation
  • Considerations for operations
  • Future improvements to the program


Course methods include lecture, group exercises, and scenario completion.

Participants will receive a course notebook, case studies and a downloadable copy of the course materials.


This 3 day course meets at the following times:

Days 1-3, 8:30 a.m. - 4:30 p.m.

Insider Threat Program Manager - Implementation and Operation at Heinz College

From  $3,150
Add coaching to your course booking

Coaching can personalize and deepen learning for you and your organization.

Something went wrong. We're trying to fix this error.

Thank you for your application

We will contact the provider to ensure that seats are available and, if there is an admissions process, that you satisfy any requirements or prerequisites.

We may ask you for additional information.

To finalize your enrollment we will be in touch shortly.


Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Finance

During Finance courses, you will get acquainted with a huge number of financial analyst tools and learn how to work with them. So, you will learn how to make and analyze financial reporting, calculate the main financial indicators of the company and ...

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.