Home

 


About Us

 


Press Releases

 


Insider Threat

Public Speaking

 


Insider Threat Program

Training Course

 


NISPOM

Conforming Change 2 Training

 


Insider Threat

Risk Assessments

 


Insider Threat

Risk Mitigation Services

 


Insider Threat Awareness Resources

 


National Insider Threat Special Interest Group

 


Cyber Security Information Systems Security Training

 


Contact Us

 


Insider Threat Defense

Trademark Notice

ITD TM Information

 


 

 

 

 

 

 

 

 

 

 

joomla counter

 

 

Insider Threat Program Development-Management

Training Course

 

Please Visit Our New Website For The Most Up To Date Information


 

Combating The Insider Threat Problem
The Insider Threat Program Development-Management Training Course was developed in response to the many past and current data breaches affecting U.S. Government Agencies (USGA) WikiLeaks, NSA Breach), and many other data breaches that have affected businesses and private sector organizations.

 

Whether it is a data breach caused by a malicious Insider working for a USGA, business, or private sector organization, the damages can be costly and severe.

 

This unique and specialized Insider Threat Program Development-Management Training Course will provide USGA, businesses and private sector organizations with the knowledge and resources to establish a robust and effective Insider Threat Program.

 

 

 

Insider Threat Programs For The U.S. Government
The Insider Threat Program Development-Management  Training Course Was Developed In Accordance With;

  • Executive Order (EO) 13587, National Insider Threat Policy (NITP)

  • CNSSD 504-Protecting National Security Systems From Insider Threat

  • Department Of Defense (DoD) Instruction 5240.26-Countering Espionage, International Terrorism, And The Counterintelligence (CI) Insider Threat

  • Navy Insider Threat Program-SECNAVINST 5510.37

  • Army Insider Threat Program-Directive 2013-18

  • Air Force Instruction 16-1402 Insider Threat Program Management

  • NISPOM Conforming Change 2 - Insider Threat

 

The Insider Threat Program Development-Management Training Course will meet and exceed the National Insider Threat Policy and NISPOM Conforming Change 2 - Insider Threat Program requirements for establishing an Insider Threat Program.

 

The Insider Threat Program Development-Management Training Course leverages existing federal laws, statutes, authorities, policies, programs, and resources in order to counter the Insider Threat. (FISMA, NIST, DNI, CNSS, DoD, OMB).
 

 

 

Insider Threat Programs For Defense Industrial Base (DIB) Contractors

Businesses that support the DoD, such as Defense Industrial Base (DIB) contractors, must adhere to the National Industrial Security Program Operating Manual (NISPOM).

 

NISPOM Conforming Change 2 requires DIB contractors to have Insider Threat Programs.

 

NISPOM Conforming Change 2 was released on May 21, 2016.

DIB Contractors must have a written Insider Threat Program Plan in place to begin implementing an Insider Threat Program, no later then November 30, 2016.

 

 

Insider Threat Programs For Businesses / Private Sector Organizations
No mandates, standards, or models exist for Insider Threat Programs for businesses or private sector organizations. Therefore, it is difficult for businesses and organizations to develop or assess their Insider Threat Programs. Insider Threat Programs for businesses and private sector organizations are critical for preventing, detecting and mitigating the Insider Threat.

Insider Threat Defense
has taken our knowledge and expertise in developing a U.S. Government, DoD, IC Insider Threat Program Model, an developed an Insider Threat Program Risk Management Framework (ITP RMF) for businesses and private sector organizations. The ITP RMF can be used and tailored for any large or small business or organization.

 

No evaluations of Insider Threat Programs for the private sector had been conducted until the Intelligence And National Security Alliance (INSA) produced a report titled: Preliminary Examination Of Insider Threat Programs In The U.S. Private Sector. We have taken the weaknesses found in the private sector Insider Threat Program report and incorporated the recommendations into our Insider Threat Program Risk Management Framework for businesses and organizations. Insider Threat Defense is not aware of any other company that has produced such a unique, comprehensive and structured Insider Threat Program Model for businesses and private sector organizations.

 

 

 

Insider Threat Program Development-Management Training Course Target Audience

  • U.S. Government Agencies

  • Department Of Defense

  • Intelligence Community Agencies

  • Defense Industrial Base Contractors

  • Critical Infrastructure Providers

  • Energy Industry

  • Telecommunications Industry

  • Airport / Airline Industry

  • Banking / Financial Industry

  • Healthcare Industry

  • Food Industry

  • Private Sector Businesses / Organizations

 

The Insider Threat Program Development-Management  Training Course Is Designed For Individuals Who Are Responsible For, Or Involved In;

  • Chief Executive Officers (CEO) / Senior & Mid Level Managers

  • Insider Threat Program Manager

  • Insider Threat Security Analyst

  • Insider Threat Program Support Personnel

  • Computer Security Incident Response Team Personnel

  • Security Directors

  • Corporate Anti-Fraud Investigator / Certified Fraud Examiners

  • Counterintelligence Investigators

  • Antiterrorism / Force Protection (AT/FP)

  • Facilities Security Officers

  • Human Resources, Personnel Security Specialists

  • Chief Information Officers (CIO)

  • Cyber Security Program Manager

  • Information Technology (IT) Administrators

  • Network Security Administrators

  • Chief Information Security Officers (CISO)

  • Information Systems Security Managers, Officers (ISSM), (ISSO)

  • Information Assurance Managers (IAM), Officers (IAO)

  • Chief Risk Offers

  • Contracting Officers (COTR)

  • Legal / General Counsel

  • Office Of Inspector General

 

 

Insider Threat Program Development-Management Training Course --  Key Learning Objectives

Instructor Bio

2 Day Course

  • Insider Threat Terminology

  • How Damaging And Costly An Insider Threat Incident Can Incident Can Be (Case Studies / Examples Of Different Types Of Insider Threats)

  • The Behavioral Indicators Of Concern To An Insider Threat Program (Witting, Unwitting)

  • The Security Policies And Procedures Needed To Build A Foundation Of Security For The Protection Of The Organization Assets And Insider Threat Risk Mitigation

  • The Importance Of Gaining Buy-In From Senior Management And Defining The Scope Of An Insider Threat Program

  • The Essential Elements Needed For Successful Insider Threat Program Development And Insider Threat Risk Mitigation

  • How To Develop An Insider Threat Program Per NISPOM Conforming Change 2 Requirements (ITP Blueprint)

  • Why Going Beyond NISPOM Conforming Change 2 Requirements Is Essential For Successful Insider Threat Risk Mitigation

  • How To Create An Insider Threat Risk Management Framework / Insider Threat Program Hub / Working Group

  • What Are The Essential Data Sources That Will Support An Insider Threat Program (Data Collection & Analysis, Technical, Non-Technical)

  • How To Develop An Insider Threat Program Policy (Templates Supplied)

  • The Importance Of Creating Insider Threat Program NDA's, Rules Of Behavior (Template Supplied)

  • How To Build Insider Threat Awareness Into The Workforce To Detect And Report Potential Insider Threats (Insider Threat Awareness DVD's Provided)

  • How To Detect Activity Indicative Of Insider Threat Behavior With User Activity Monitoring Tools

  • How To Handle Insider Threat Inquiries, Investigations & Case Management

  • The Technical / Non-Technical Threats That Can Be Utilized By Insiders For Malicious Purposes

  • How To Conduct Insider Threat Risk Assessment To Identify Vulnerabilities

Instructor Bio

 

 

 

Insider Threat Program Manager  Exam
The Insider Threat Program Development-Management Training Course concludes with an exam. The Insider Threat Program Manager  Exam is unique and was designed to exclusively validate a student’s knowledge of;

  • National Insider Threat Policy - NISPOM Conforming Change 2 Requirements.

  • Developing, Implementing, Managing or Supporting an Insider Threat Program using an Insider Threat Program Risk Management Framework.

  • Assessing an existing Insider Threat Program for weaknesses and making enhancements.

  • Mitigation strategies used to protect an organization from Espionage and Insider    Threat.

  • Providing Insider Threat Awareness Training and Reporting Guidance to the    organizations workforce.

  • The exam consists of multiple choice, matching and true / false questions. Unlike other security certifications and training courses that are Pass / Fail, the instructor will work with students until they pass the exam, at no additional charge.

 

 

Insider Threat Program Manager - Senior Official (ITPMSO) Certificate
The ITPMSO Certificate Will Validate And Provide Confidence To Employers That The ITPMSO;

  • Understands the minimum standards and guidance for implementation of an Insider Threat Program per National Insider Threat Policy / NISPOM Conforming Change 2.

  • Can effectively communicate with the many individuals that support an Insider Threat Program / Insider Threat Program Working Group.

  • Has the knowledge, skills and resources to develop, implement and manage or support an Insider Threat Program.

  • Can conduct Insider Threat Risk Assessment to identify vulnerabilities, and provide actionable risk mitigation strategies to detect, deter and mitigate Insider Threats.

 

 

 

Insider Threat Risk Assessment And Mitigation (ITRAM) Handbook
Students attending the Insider Threat Program Development-Management Training Course receive an ITRAM Handbook. (140+ Pages)
The ITRAM Handbook Provides;

  • Guidance for developing and evaluating an organization’s Insider Threat Program.

  • Numerous checklists that provide an organization with the ability to assess its vulnerability to Insider Threats.

  • Mitigation strategies, best practices and safeguards focused on addressing     organizational weaknesses in an effort to combat the Insider Threat.

 

 

Insider Threat Program Development-Management Training Course Student DVD Toolkit

  • The DVD is filled with the training presentations and many useful resources; Insider Threat Program Policy templates, Insider Threat Program Support Personnel Non-Disclourse Agreement template, Insider Threat Program Information Sharing MOU-MOA template, Insider Threat Awareness and Education materials and other resources to help develop, implement and manage an Insider Threat Program.

  • Insider Threat Defense is currently the only company that provides students with an Insider Threat Program Development Toolkit / DVD.

 

 

Security Certification Credits (CPE)
Please see the link below regarding Security Certification Credits (CPE's) for attending the Insider Threat Program
Development-Management  Training Course.
Security Certifications CPE Credits-Requirements

 

 

 

Course Schedule / Locations / Pricing / Enrollment
The Insider Threat Program Development-Management  Training Course is offered at various locations throughout the U.S.

 

The course can be purchased specifically for your organization. We will come to your location to present the course.

 

Interested in having a training class taught to your security group / chapter or other organization? Please call to discuss further.
 

Interested in hosting a training class for multiple companies? (Your Company Will Receive A Discount On The Training). Please call to discuss further.

 

Please check out our "New Website" for class dates, locations, pricing, and enrollment.

 

 


 

Insider Threat Defense (ITD) Past Performance
ITD has provided training and services to a very impressive portfolio of 500+ clients and is excited to announce that the following organizations have attended the the Insider Threat Program Development-Management Training Course;

White House National Security Council
* FBI
* Defense Criminal Investigate Service
* Defense Security Service
* OPM – Federal Investigative Services
* Government Accountability Office
* Social Security Administration

* Centers For Disease Control & Prevention
 

* National Nuclear Security Administration
* U.S. Cyber Command
* U.S. Army Enterprise NetOps
* Army Signal Command
* Marine Corps Intelligence Activity
* Texas A&M University
* University of Massachusetts Lowell
* Royal Canadian Mounted Police

 

* American Express
* Home Depot
* Equifax
* UPS
* Georgia Power
* Delta Airlines
* Boeing Integrated Information Systems
* Raytheon / Raytheon BBN Technologies
* General Dynamics Mission Systems
* EMC Corporation
* L-3 Communications
* General Electric
* BAE Systems
* Ernst & Young
* MITRE
* Bechtel
* AECOM Technology Corporation
* Stinger Ghaffarian Technologies
* Mercer Engineering Research Center
* Lockheed Martin, Missiles & Fire Control
* AT&T Government Solutions Security
* Booz Allen Hamilton
* RS Microwave Company, Inc.
* DRS Technologies
* Thales Defense & Security
* Honeywell
* Mason Harriman Group
* Ames Rubber Corporation
* Microwave Development Laboratories, Inc.
* American Science & Engineering, Inc.
* Hydroid - Kongsberg Maritime
* Solidus Technical Solutions
* QinetiQ North America
* Rochester Electronics
* Mercury Systems, Inc.
* KAMAN Corporation
* LinQuest Corporation
* Fiber Materials Inc. |
* Navistar Defense
* Oshkosh Corporation
* Procon Consulting
* MorphoTrust USA
* Applied Communication Sciences
* RIVA Networks
* SciTec, Inc.
* Envision Innovative Solutions, Inc.
* DynCorp International, LLC
* Savit Corporation

* And More...... (Full Client Listing)

 

 

 

Student Comments

Past students are rating the Insider Threat Program Development-Management Training in the "Above Average" to "Excellent" Category. Student comments are stating that the training is one the most comprehensive, structured, holistic, resourceful and affordable courses available. (Insider Threat Program Managers References-Contact Information, Provided Upon Request) (Student Evaluations & Comments)

 

 

 

 

Insider Threat Program Development-Management  Training Course -- Design And Development
The CEO of Insider Threat Defense worked for the DoD Insider Threat Counterintelligence Group (DoD ITCIG) from 2009-2011. He was one of the original members of the DoD ITCIG that assisted the DoD in establishing a comprehensive and structured DoD Enterprise Insider Threat Program Model that integrated the security disciplines of Counterintelligence (CI), Security and Information Assurance (IA).

 

The DoD Insider Threat Program Model defined the baseline activities to be conducted by DoD Combatant Commands, Services and Agencies to support their Insider Threat Programs. Much of the work done at the DoD ITCIG laid the foundation for the National Insider Threat Policy and other related documentation to support Insider Threat Program development and implementation.

 

After doing extensive research into existing training courses for Insider Threat Program Development and Management, and speaking with various CI, Security and IA experts from across the DoD and IC, the overall consensus and feedback was that an Insider Threat Program Development-Management Training Course / Insider Threat Security Specialist Certificate was desperately needed. As the Insider Threat Program Development-Management  Training Course was developed, input was received from numerous CI, Security and IA experts.

 

The Insider Threat Program Development-Management Training Course has been peer reviewed by: Insider Threat Subject Matter Experts who support Insider Threat Programs for U.S. Government Agencies, the Department of Defense, Intelligence Community Agencies, Defense Industrial Base Contracts, large and small businesses.

 

 

free hit counters

 

 
 

         

Copyright © 2014- INSIDER THREAT DEFENSE - All Rights Reserved - Legal Notice