Home

 


About Us

 


Press Releases

 


Insider Threat

Public Speaking

 


Insider Threat Program

Training Course

 


Insider Threat

Risk Assessments

 


Insider Threat

Risk Mitigation Services

 


Insider Threat Awareness Resources

 


National Insider Threat Special Interest Group

 


Cyber Security Information Systems Security Training

 


Contact Us

 


 

 

 

 

 

 

 

 

 

 

 

 

joomla counter

 

 

Combating The Insider Threat Problem
The Insider Threat Program Training Course was developed in response to the many past and current data breaches affecting U.S. Government Agencies (USGA) WikiLeaks, NSA Breach), and many other data breaches that have affected businesses and private sector organizations.

 

Whether it is a data breach caused by a malicious Insider working for a USGA, business, or private sector organization, the damages can be severe.

 

This unique and specialized Insider Threat Program Training Course will provide USGA, businesses and private sector organizations with the knowledge and resources to combat the continued Insider Threat problem.

 

 

Insider Threat Programs For The U.S. Government
The Insider Threat Program Training Course was developed in accordance with;

The Insider Threat Program Training Course will meet and exceed the National Insider Threat Policy and NISPOM Conforming Change 2 - Insider Threat Program requirements for establishing an Insider Threat Program.

 

The Insider Threat Program Training Course leverages existing federal laws, statutes, authorities, policies, programs, and resources in order to counter the Insider Threat. (FISMA, NIST, DNI, CNSS, DoD, OMB).
 

 

Insider Threat Programs For Defense Industrial Base (DIB) Contractors

Businesses that support the DoD, such as Defense Industrial Base (DIB) contractors, must adhere to the National Industrial Security Program Operating Manual (NISPOM).

 

NISPOM Conforming Change 2 will require DIB contractors to have Insider Threat Programs. Insider Threat Program Requirements for DIB contractors are based off of National Insider Threat Policy. It is anticipated that NISPOM Conforming Change 2 will be signed in 2015.

 

Update On NISPOM Conforming Change 2 Release

Once signed and released DIB contractors will have 6 months for implementation of an Insider Threat Program. At the National Insider Threat Special Interest Group - Insider Threat Symposium & Expo on March 31, 2015, it was reported by a speaker from the DoD that NISPOM Conforming Change 2 could be signed by August 2015.


 

Insider Threat Programs For Businesses / Private Sector Organizations
No mandates, standards, or models exist for Insider Threat Programs for businesses or private sector organizations. Therefore, it is difficult for businesses and organizations to develop or assess their Insider Threat Programs. Insider Threat Programs for businesses and private sector organizations are critical for preventing, detecting and mitigating the Insider Threat.

Insider Threat Defense has taken our knowledge and expertise in developing a U.S. Government, DoD, IC Insider Threat Program Model, an developed an Insider Threat Program Risk Management Framework (ITP RMF) for businesses and private sector organizations. The ITP RMF can be used and tailored for any large or small business or organization.

 

No evaluations of Insider Threat Programs for the private sector had been conducted until the Intelligence And National Security Alliance (INSA) produced a report titled: Preliminary Examination Of Insider Threat Programs In The U.S. Private Sector. We have taken the weaknesses found in the private sector Insider Threat Program report and incorporated the recommendations into our Insider Threat Program Risk Management Framework for businesses and organizations. Insider Threat Defense is not aware of any other company that has produced such a unique, comprehensive and structured Insider Threat Program Model for businesses and private sector organizations.
 

 

Insider Threat Program Training Course Target Audience

  • U.S. Government, DoD, Intelligence Community (IC) Agencies and Defense Industrial Base Contractors responsible for protecting classified information.

  • Businesses and private sector organizations responsible for protecting sensitive information, intellectual property, trade secrets, patient health care information, etc.

 

The Insider Threat Program Training Course Is Designed For Individuals Who Are Responsible For, Or Involved In;

  • Insider Threat Program Management, Insider Threat Program Personnel, Insider Threat Analysts.

  • The security disciplines of Counterintelligence, Personnel Security, Physical Security, Antiterrorism / Force Protection (AT/FP), Information Assurance, Information Security, Information System Security

  • Anyone involved in supporting Insider Threat Programs / Corporate Anti-Fraud Programs;

    • Human Resources / Personnel Security

    • Physical Security / Facility Security Officers

    • Counterintelligence Investigators

    • C-Suite Management (CEO) / Senior Directors

    • Mid Level Management / Business Unit Managers

    • Chief Risk Officer / Risk Management

    • Chief Privacy Officer

    • Chief Information Officer (CIO) / Information Technology (IT) Department

    • Chief Information Security Officer (CISO)

    • Cyber Security Program Manager

    • Information Systems Security Manager / Officer

    • Information Assurance Manager / Officer

    • Network Security / IT Security / Database Administrators

    • Security, Education Training And Awareness

    • Computer Security Incident Response Team

    • Records / Information Management

    • Contracting Officer (COTR)

    • Office Of Inspector General

    • Legal / General Counsel

    • Certified Fraud Examiners
       

Insider Threat Program Training Course Objectives
The Insider Threat Program (ITP) Training Course is a 3 day course covering 17 different modules.

 

The Insider Threat Program Training Course Will Teach Individuals How To;

  • Develop, implement, manage or support an Insider Threat Program per National Insider Threat Policy and NISPOM Conforming Change 2-Insider Threat requirements.

  • Build an Insider Threat Program Risk Management Framework to support the ITP.

  • Assess an existing Insider Threat Program for weaknesses and make enhancements.

  • Identify Insider Threat risks, vulnerabilities and    weaknesses within an organization.

  • Use risk mitigation strategies and actionable steps that they can be taken to    detect, deter and mitigate Insider Threats within an organization.

  • Develop and implement an Insider Threat Awareness and Reporting Program.

  • Enhance an existing Insider Threat Program, by providing access to an Insider Threat Program / Insider Threat Security Specialist Resource Website. The website contains additional Insider Threat Program - Insider Threat Risk Mitigation training material and resources. Insider Threat Defense is currently the only company that has developed such a unique and useful resource website for Insider Threat Program Training, Insider Threat Risk Mitigation and Insider Threat Awareness and Education. The website portal provides a 365 Day-A-Year, 24 x 7, continuous awareness and education program that is relevant, current and easily accessible through a web browser or tablet. The website is constantly updated with the latest information related to Insider Threats, Insider Threat Programs, Espionage, Counterespionage, etc. Individuals are notified of updates to the website via e-mails alerts. * (Free Access For 60 Days After Training)

 

Insider Threat Program Training Course / Insider Threat Security Specialist Exam
The Insider Threat Program Training Course concludes with an exam. The Insider Threat Security Specialist Exam is unique and was designed to exclusively validate a student’s knowledge of;

  • National Insider Threat Policy - NISPOM Conforming Change 2 Requirements.

  • Developing, Implementing, Managing or Supporting an Insider Threat Program using an Insider Threat Program Risk Management Framework.

  • Assessing an existing Insider Threat Program for weaknesses and making enhancements.

  • Mitigation strategies used to protect an organization from Espionage and Insider    Threat.

  • Providing Insider Threat Awareness Training and Reporting Guidance to the    organizations workforce.

  • The exam consists of multiple choice, matching and true / false questions. Unlike other security certifications and training courses that are Pass / Fail, the instructor will work with students until they pass the exam, at no additional charge.

 

 

Insider Threat Security Specialist Certificate
Upon the successful passing of the exam students will receive an Insider Threat Security Specialist (ITSS) Certificate.

The ITSS Certificate Will Validate And Provide Confidence To Employers That The ITSS;

  • Understands the minimum standards and guidance for implementation of an Insider Threat Program per National Insider Threat Policy.

  • Can effectively communicate with the many individuals that manage and support and Insider Threat Program.

  • Can assess an existing Insider Threat Program for weaknesses and make enhancements.

  • Can identify Insider Threat risks, vulnerabilities and weaknesses within an  organization, and provide actionable risk mitigation strategies to detect, deter and mitigate Insider Threats.

  • Develop and implement an Insider Threat Awareness and Reporting Program.

  • The benefits of becoming an Insider Threat Security Specialist are many.        Insider Threat Security Specialist Benefits

 

 

Insider Threat Risk Assessment And Mitigation (ITRAM) Handbook
Students attending the Insider Threat Program Training Course receive an ITRAM handbook. (100+ Pages)
The ITRAM Handbook Provides;

  • Guidance for developing and evaluating an organization’s Insider Threat Program.

  • Numerous checklists that provide an organization with the ability to assess its vulnerability to Insider Threats.

  • Mitigation strategies, best practices and safeguards focused on addressing     organizational weaknesses in an effort to combat the Insider Threat.

 

Download:

Insider Threat Program Training Course Modules

 

Insider Threat Program Training Course Brochure

 

 

 

Course Schedule / Classroom Locations / Course Pricing / Enrollment
Currently the Insider Threat Program Training Course is offered at various locations in the Washington, DC Metropolitan area, Florida and locations throughout the U.S.

 

The Insider Threat Program Training Course can be purchased specifically for your organization. We will come to your location to present the course.

 

NCMS Chapters:

Interested in having the Insider Threat Program Training Course taught to your NCMS Chapter? Please call to discuss further.

 

 

Course Schedules:

  • September 14, 15, 16, 2015 -- Location TBD.

    • Depending on the size of the class, it will be held at one of the locations below. In late August the location of the training facility will be announced, so students can make reservations if they are traveling from out of town. The 2 locations listed below are within 20 minutes of each other.

  • Other courses will be held after September. Dates will be posted on the website in September.

 

Classroom Location-1:

Tanager Insider Threat Risk Mitigation Experts

10010 Junction Drive
Suite 120N
Annapolis Junction, Maryland 20701

 

Nearby Hotels

Courtyard Marriot Fort Meade, Maryland
Marriot TownePlace Suites, Fort Meade, Maryland
Comfort Inn Jessup, Maryland

 

 


Classroom Location-2:
Holiday Inn Business Center
15101 Sweitzer Lane
Laurel, Maryland, 20707

 

Nearby Hotel

Holiday Inn (Same Location As Holiday Inn Business Center)
 

 

 

Course Pricing / Enrollment
$1395.00 Per Person

 

Group Rates With Discount: 

Call for details and pricing.
 

Payment Options:

We accept credit cards, checks and purchase orders.

 

 

Enrollment In The Insider Threat Program Training Course
Insider Threat Program Training Course Enrollment Form

Please complete, scan and e-mail to: jimhenderson@insiderthreatdefense.com

 


Security Certification Credits (CPE)
Please see the link below regarding Security Certification Credits (CPE's) for attending the Insider Threat Program Training Course.
Security Certifications CPE Credits-Requirements

DoD 8570.01M Information Assurance Workforce Improvement Manual Training-Continuing Education Requirements

 

 

Insider Threat Defense Past Performance
Insider Threat Defense is also excited to announce that the following organizations / individuals have attended the the Insider Threat Program Training Course;

 

 

 

Click Here For Information On:

Insider Threat Program Training Course - Student Evaluations

 

Past students are rating the Insider Threat Program Training in the "Above Average" to "Excellent" Category. Student comments are stating that the training is one the most comprehensive, structured, holistic, resourceful and affordable courses available.

 

 

 

Recognition / Award For Insider Threat Program Training Course Website
We are also proud to announce that our Insider Threat Program Training Course website won an award from the Federal Information Systems Security Educators' Association (FISSEA), for its design, uniqueness and usefulness.



Insider Threat Program Training / Insider Threat Security Specialist Education Baseline Standards
The CEO of Insider Threat Defense is an industry recognized Subject Matter Expert and Public Speaker on Insider Threats. Insider Threat Defense is aiming to set the baseline standard for Insider Threat Program Training / Insider Threat Security Specialist education. Currently there are no such baseline standards.



Insider Threat Program Training Course /  Insider Threat Security Specialist Certificate Development
The CEO of Insider Threat Defense worked for the DoD Insider Threat Counterintelligence Group (DoD ITCIG) from 2009-2011. He was one of the original members of the DoD ITCIG that assisted the DoD in establishing a comprehensive and structured DoD Enterprise Insider Threat Program Model that integrated the security disciplines of Counterintelligence (CI), Security and Information Assurance (IA).

 

The DoD Insider Threat Program Model defined the baseline activities to be conducted by DoD Combatant Commands, Services and Agencies to support their Insider Threat Programs. Much of the work done at the DoD ITCIG laid the foundation for the National Insider Threat Policy and other related documentation to support Insider Threat Program development and implementation.

 

After doing extensive research into existing training courses for Insider Threat Program development, and speaking with various CI, Security and IA experts from across the DoD and IC, the overall consensus and feedback was that an Insider Threat Program Training Course / Insider Threat Security Specialist Certificate was desperately needed. As the Insider Threat Program Training Course was developed, input was received from numerous CI, Security and IA experts.

 

The Insider Threat Program Development Training Course has been peer reviewed by Insider Threat Subject Matter Experts who support Insider Threat Programs for U.S. Government Agencies, the Department of Defense, Intelligence Community Agencies, Defense Industrial Base Contracts, large and small business.

free hit counters

 

 
 

         

Copyright © 2014- INSIDER THREAT DEFENSE - All Rights Reserved - Legal Notice