Combating The Insider Threat Problem
The Insider Threat Program Training Course was developed in response
to the many past and current data breaches affecting U.S. Government
Agencies (USGA) WikiLeaks, NSA Breach), and many other data breaches
that have affected businesses and private sector organizations.
Whether it is a data breach caused by a malicious Insider working
for a USGA, business, or private sector organization, the damages
can be severe. This unique and specialized Insider Threat Program
Training Course will provide USGA, businesses and private sector
organizations with the knowledge and resources to combat the
continued Insider Threat problem.
Insider Threat Programs For The U.S. Government
The Insider Threat Program Training Course was developed in
accordance with Executive Order (EO) 13587, National Insider Threat
Policy (NITP) and other supporting regulations; CNSSD 504-Protecting
NSS From Insider Threat, Department Of Defense (DoD) Instruction
5240.26-Countering Espionage, International Terrorism, And The
Counterintelligence (CI) Insider Threat, Navy Insider Threat
Program-SECNAVINST 5510.37, Army Insider Threat Program-Directive
2013-18. The Insider Threat Program Training Course will meet and
exceed the NITP requirements for establishing an Insider Threat
Program and providing Insider Threat Awareness Training-Reporting
Guidance. The Insider Threat Program Training Course leverages
existing federal laws, statutes, authorities, policies, programs,
and resources in order to counter the Insider Threat. (FISMA, NIST,
DNI, CNSS, DoD, OMB).
Insider Threat Programs For Businesses / Private Sector
No mandates, standards, or models exist for Insider Threat Programs
for businesses or private sector organizations. Therefore, it is
difficult for businesses and organizations to develop or assess
their Insider Threat Programs. Insider Threat Programs for
businesses and private sector organizations are critical for
preventing, detecting and mitigating the Insider Threat.
Insider Threat Defense has taken our knowledge and expertise in
developing a U.S. Government, DoD, IC Insider Threat Program Model,
an developed an Insider Threat Program Risk Management Framework (ITP
RMF) for businesses and private sector organizations. The ITP RMF
can be used and tailored for any large or small business or
The ITP RMF can also be used by businesses that support the DoD,
such as the Defense Industrial Base (DIB) contractors. DIB
contractors must adhere to the National Industrial Security Program
Operating Manual (NISPOM).
NISPOM is currently undergoing revision. The revised NISPOM will
include requirements for DIB contractors to have Insider Threat
No evaluations of Insider Threat Programs for the private sector had
been conducted until the Intelligence And National Security Alliance
(INSA) produced a report titled:
Preliminary Examination Of Insider Threat Programs In The U.S.
Private Sector. We have taken the weaknesses found in the
private sector Insider Threat Program report and incorporated the
recommendations into our Insider Threat Program Risk Management
Framework for businesses and organizations. Insider Threat Defense
is not aware of any other company that has produced such a unique,
comprehensive and structured Insider Threat Program Model for
businesses and private sector organizations.
Insider Threat Program Training Course Target Audience
The target audience for the Insider Threat Program Training Course
Government, DoD, Intelligence Community (IC) Agencies and Defense
Industrial Base Contractors responsible for protecting classified
Businesses and private sector organizations responsible for
protecting sensitive information, intellectual property, trade
secrets, patient health care information, etc.
The Insider Threat Program Training Course is designed for
individuals who are responsible for, or involved in;
Insider Threat Program Management, Insider Threat Program Personnel,
Corporate Anti-Fraud Programs.
security disciplines of Counterintelligence, Personnel Security,
Physical Security, Antiterrorism/Force Protection (AT/FP),
Information Assurance, Information Security, Information System
Anyone involved in supporting Insider Threat Programs / Corporate
Anti-Fraud Programs; Chief Information Officer (CIO), Chief
Information Security Officer (CISO), Network Security / IT Security,
Information System Security Manager/Officer, Computer Security
Incident Response Team, Human Resources, Privacy Office,
Legal/General Counsel, Office Of Inspector General, Certified Fraud
Insider Threat Program Training Course Objectives
The Insider Threat Program (ITP) Training Course is a
day course covering
different modules. It is well structured and comprehensive. It will
teach individuals how to;
Develop, implement, manage or support an Insider Threat Program.
Provide an Insider Threat Program Risk Management Framework to build
Assess an existing ITP for weaknesses and make enhancements.
and implement an Insider Threat Awareness and Reporting Program.
Provide in depth knowledge to identify Insider Threat risks,
vulnerabilities and weaknesses within an organization.
Provide risk mitigation strategies and actionable steps that they
can be taken to detect, deter and mitigate Insider Threats within an
Provide access to an Insider Threat Program / Insider Threat
Security Specialist Resource Website with additional ITP training
material and resources. Insider Threat Defense is currently the only
company that has developed such a unique and useful resource website
for Insider Threat awareness and education. The website portal
provides a 365 Day-A-Year, 24 x 7, continuous awareness and
education program that is relevant, current and easily accessible
through a web browser or tablet. The website is constantly updated
with the latest information related to Insider Threats, Insider
Threat Programs, Espionage, Counterespionage, etc. Individuals are
notified of updates to the website via e-mails alerts.
Insider Threat Program Training Course / Insider Threat Security
The Insider Threat Program Training Course concludes with an exam.
The Insider Threat Security Specialist Exam is unique and was
designed to exclusively validate a student’s knowledge of;
Insider Threat Policy Requirements and laws related to Insider
Developing, Implementing, Managing or Supporting an Insider Threat
Program using an Insider Threat Program Risk Management Framework.
Assessing an existing ITP for weaknesses and making enhancements.
Mitigation strategies used to protect an organization from Espionage
and Insider Threat.
Insider Threat Awareness Training and Reporting Guidance to the
organizations workforce. The exam consists of multiple choice,
matching and true/false questions. Unlike other security
certifications and training courses that are Pass / Fail, the
instructor will work with students
until they pass the exam, at no additional charge.
Insider Threat Security Specialist Certificate
Upon the successful passing of the exam students will receive an
Insider Threat Security Specialist (ITSS) Certificate.
Certificate will validate and provide confidence to employers that
the minimum standards and guidance for implementation of an Insider
effectively communicate with the many individuals that manage and
support and Insider Threat Program.
assess an existing Insider Threat Program for weaknesses and make
identify Insider Threat risks, vulnerabilities and weaknesses within
an organization, and provide actionable risk mitigation strategies
to detect, deter and mitigate Insider Threats.
and implement an Insider Threat Awareness and Reporting Program. Insider Threat Security Specialist Certificate Brochure
Insider Threat Risk Assessment And Mitigation (ITRAM) Handbook
Students attending the Insider Threat Program Training Course
receive an ITRAM handbook. (100+ Pages)
The ITRAM Handbook Provides;
for developing and evaluating an organization’s Insider Threat
checklists that provide an organization with the ability to assess
vulnerability to Insider Threats.
strategies, best practices and safeguards focused on addressing
organizational weaknesses in an effort to combat the Insider Threat.
Insider Threat Program Training Course Classroom Locations /
the Insider Threat Program Training Course is offered at various
locations in the Washington, DC Metropolitan area, Florida and
locations throughout the U.S. Please contact us for the schedule and
availability of classes as the Insider Threat Program Training
Course has been in high demand. The Insider Threat Program Training
Course can be purchased specifically for your organization. We will
come to your location to present the course
Insider Threat Program Training Course Pricing Instructor Led ITP Training Course:
Per Person Group Rates With Discount:
details and pricing. Web Based Virtual ITP Training Course:
details and pricing. Payment Options:
credit cards, checks and purchase orders.
Enrollment In The Insider Threat Program Training Course
Please contact us and we will e-mail you the enrollment forms.
Recognition / Award For Insider Threat Program Training Course
We are also proud to announce that our Insider Threat Program
Training Course website won an award from the Federal Information
Systems Security Educators' Association (FISSEA) in 2010, for its
design, uniqueness and usefulness.
Insider Threat Program Training / Insider Threat Security Specialist
Education Baseline Standards
The CEO of Insider Threat Defense is an industry recognized Subject
Matter Expert and
Public Speaker on Insider Threats. Insider Threat Defense
is aiming to set the baseline standard for Insider Threat Program
Training / Insider Threat Security Specialist education. Currently
there are no such baseline standards.
Insider Threat Program Training Course / Insider Threat Security Specialist
The CEO of Insider Threat Defense worked for the DoD Insider Threat
Counterintelligence Group (DoD ITCIG) from 2009-2011. He was one of
the original members of the DoD ITCIG that assisted the DoD in
establishing a comprehensive and structured DoD Enterprise Insider
Threat Program Model that integrated the security disciplines of
Counterintelligence (CI), Security and Information Assurance (IA).
The DoD Insider Threat Program Model defined the baseline activities
to be conducted by DoD Combatant Commands, Services and Agencies to
support their Insider Threat Programs. Much of the work done at the
DoD ITCIG laid the foundation for the National Insider Threat Policy
and other related documentation to support Insider Threat Program
development and implementation. After doing extensive research into
existing training courses for Insider Threat Program development,
and speaking with various CI, Security and IA experts from across
the DoD and IC, the overall consensus and feedback was that an
Insider Threat Program Training Course / Insider Threat Security
Specialist Certificate was desperately needed. As the Insider Threat
Program Training Course was developed, input was received from
numerous CI, Security and IA experts.
The parent company to ITD is
TopSecretProtection.Com(TSP). The Insider Threat Program Training Course incorporates
some of the training modules and materials from the TSP Cyber
Security-Information Systems Security Training Course (CS-ISSP). The
National Security Agency (NSA) awarded TSP a contract to train a
large number of NSA Computer Security Professionals in 2009. In 2013
the Department of Energy (DOE) awarded TSP a contract to train DOE
Computer Security Professionals from many of its national labs.
Insider Threat Defense Past Performance
Insider Threat Defense is proud to mention that we have proven past
performance in training security professionals in the areas of Cyber
Security and Insider Threats.