Protecting Your Organization From Insider Threats

Georgia Tech Professional Education

How long?

  • 2 days
  • in person

Georgia Tech Professional Education

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.

Who should attend

This course is designed for chief information security officers, information security professionals, risk officers, physical security professionals, human resources professionals, program managers, and others responsible for identifying and mitigating the insider threat for their organization.

About the course

In today’s information-centric environment, protecting organizational data from deliberate or unintentional disclosure is paramount. While most organizations focus on protecting their critical assets and data from external threats, they may overlook the threats originating from inside their walls. Insiders have the potential to cause severe financial and reputational harm to an organization. This class, Protecting Your Organization from Insider Threats, will provide a foundational understanding of the insider threat and how an organization can protect itself from that threat. Discussions and activities will provide you with the tools and knowledge to design and implement an effective insider threat program tailored to your organization.

What You Will Learn

  • The insider threat landscape
  • Insider threat incident case studies and potential scenarios
  • Insider threat countermeasures
  • Technical, physical, and administrative controls
  • Insider threat program design
  • Insider threat risk and program effectiveness measurement

How You Will Benefit

  • Gain the tools and knowledge to recognize, assess, design, and implement an effective insider threat program tailored to your organization.
  • Learn how to protect your organization from an insider threat.

Course Content

OVERVIEW

  • Insider threat landscape
  • Insider threat actors
  • Case studies

INSIDER THREAT PROGRAMS

  • Regulatory requirements
  • Keys to success
  • Common challenges

MEASURING INSIDER THREAT RISK

  • Qualitative measurements
  • Quantitative measurements
  • Workshop

CONTROLS

  • Technical controls
  • Physical and administrative controls
  • Workshop

DESIGNING AN INSIDER THREAT PROGRAM

  • Measuring program effectiveness
  • Insider threat program roadmap
  • Threat program frameworks
  • Workshop

Experts

Barbara Fox

Barbara Fox (CISSP) is a Research Scientist in the Georgia Tech Research Institute (GTRI) Cyber Technology and Information Security Laboratory (CTISL). Her research focuses on risk management, emerging threats, malware analysis, and insider threat. Ms. Fox combines a rich background in instructio...

Noah Tobin

Noah Tobin is the associate branch head of the Cyber Situational Awareness (CSA) branch in the Emerging Threats and Countermeasures (ETCM) division of CTISL. At ETCM Mr. Tobin has assisted various government agencies and industry partners with critical data protection, risk analysis, and insider ...

Protecting Your Organization From Insider Threats at Georgia Tech Professional Education

From  $1,295

Something went wrong. We're trying to fix this error.

Thank you for your application

We will contact the provider to ensure that seats are available and, if there is an admissions process, that you satisfy any requirements or prerequisites.

We may ask you for additional information.

To finalize your enrollment we will be in touch shortly.

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.