Part I: Modules 1-8
Module 1
Introduction to Insider Threat
This course dives into what an Insider Threat is, what it means to your organization, and why you should care. Focused on definitions, present day statistics to demonstrate the urgency, and detailed explanations on the various ways someone becomes an Insider Threat, this course touches on The Critical Pathway, Unintentional, Malicious, and Best Practices you can start today!
Module 2
Unintentional Insider Threat
Every organization is made up of people — mostly loyal, hard working people with no mal intent, but what happens when your employees don't recognize threats and unintentionally leave your organization vulnerable to attack or theft of intellectual property? This course shows you ways employees leave companies vulnerable and how to mitigate those risks.
Module 3
The Critical Pathway and Insider Threat
The Critical Pathway, as identified by Eric Shaw, explains how personal predispositions, stressors, and concerning behaviors can lead up to Insider Threat-like behaviors and/or malicious acts. This course provides details into each of those factors and addresses what companies can do when faced with related situations.
Module 4
Insider Threat and Fraud
Insider fraud is the largest threat to a given organization. Not only can fraud have massive financial impacts, but insider fraud can also lead to the compromise of Personally Identifiable Information (PII) or substantial personal information, bad publicity, and government reporting requirements. In cases like this, blowback can be swift and severe. Here we learn about various types of Insider fraud, and key things to look for to prevent it.
Module 5
Insider Threat and IT Sabotage
The threat of IT sabotage is a nightmare scenario, oftentimes conducted by an insider who was moving along The Critical Pathway. Examples of real cases are addressed, as well as ways organizations could have better responded to the threat. Here, we explain the need to understand and implement Defense in Depth in order to avoid threats of IT sabotage.
Module 6
Insider Threat and Malicious Acts
Perhaps the most frightening of intentional acts is the malicious insider. Whether they are stealing corporate trade secrets to start their own company, selling them to a nation-state for profit, or intentionally trying to harm your business, these are the Insider Threat risks that must be identified early.
Module 7
Insider Threat and Espionage
Stories of spies stealing corporate secrets are not just for the movies! Today espionage is a very real fact of doing business and this course explains how both competitors and nation states target your company and people. Real world examples are given by a former Case Officer on how potential assets were targeted, and how you can recognize those threats.
Module 8
Insider Threat and Working from Home
Employees today have been thrust into a sudden, drastically different working environment than they are used to. While wearing pajama bottoms all day is a perk, companies need to understand the added risks their employees bring while working from home. This course provides useful factors to consider to improve cyber security of WFH employees.
To find out more about ESC Global Security's global security solutions