Home

 


About Us

 


Press Releases

 


Insider Threat

Public Speaking

 


Insider Threat Program

Training Course

 


 

NISPOM

Conforming Change 2 Training

 


Insider Threat

Risk Assessments

 


Insider Threat

Risk Mitigation Services

 


Insider Threat Awareness Resources

 


National Insider Threat Special Interest Group

 


Cyber Security Information Systems Security Training

 


Contact Us

 


 

 

 

 

 

 

 

 

 

 

 

 

joomla counter

 

 

Combating The Insider Threat Problem
The Insider Threat Program Training Course
was developed in response to the many past and current data breaches affecting U.S. Government Agencies (USGA) WikiLeaks, NSA Breach), and many other data breaches that have affected businesses and private sector organizations.

 

Whether it is a data breach caused by a malicious Insider working for a USGA, business, or private sector organization, the damages can be costly and severe.

 

This unique and specialized Insider Threat Program Training Course will provide USGA, businesses and private sector organizations with the knowledge and resources to combat the continued Insider Threat problem.

 

 

Insider Threat Programs For The U.S. Government
The Insider Threat Program Training Course Was Developed In Accordance With;

The Insider Threat Program Training Course will meet and exceed the National Insider Threat Policy and NISPOM Conforming Change 2 - Insider Threat Program requirements for establishing an Insider Threat Program.

 

The Insider Threat Program Training Course leverages existing federal laws, statutes, authorities, policies, programs, and resources in order to counter the Insider Threat. (FISMA, NIST, DNI, CNSS, DoD, OMB).
 

 

Insider Threat Programs For Defense Industrial Base (DIB) Contractors

Businesses that support the DoD, such as Defense Industrial Base (DIB) contractors, must adhere to the National Industrial Security Program Operating Manual (NISPOM).

 

NISPOM Conforming Change 2 will require DIB contractors to have Insider Threat Programs. Insider Threat Program Requirements for DIB contractors are based off of National Insider Threat Policy.

 

Reliable sources are stating that NISPOM Conforming Change 2 is close to becoming a mandatory requirement in 2016.

 

 

Insider Threat Programs For Businesses / Private Sector Organizations
No mandates, standards, or models exist for Insider Threat Programs for businesses or private sector organizations. Therefore, it is difficult for businesses and organizations to develop or assess their Insider Threat Programs. Insider Threat Programs for businesses and private sector organizations are critical for preventing, detecting and mitigating the Insider Threat.

Insider Threat Defense
has taken our knowledge and expertise in developing a U.S. Government, DoD, IC Insider Threat Program Model, an developed an Insider Threat Program Risk Management Framework (ITP RMF) for businesses and private sector organizations. The ITP RMF can be used and tailored for any large or small business or organization.

 

No evaluations of Insider Threat Programs for the private sector had been conducted until the Intelligence And National Security Alliance (INSA) produced a report titled: Preliminary Examination Of Insider Threat Programs In The U.S. Private Sector. We have taken the weaknesses found in the private sector Insider Threat Program report and incorporated the recommendations into our Insider Threat Program Risk Management Framework for businesses and organizations. Insider Threat Defense is not aware of any other company that has produced such a unique, comprehensive and structured Insider Threat Program Model for businesses and private sector organizations.

 

 

Insider Threat Program Training Course Target Audience

  • U.S. Government Agencies

  • Department Of Defense

  • Intelligence Community Agencies

  • Defense Industrial Base Contractors

  • Critical Infrastructure Providers

  • Airport / Airline Security Professionals

  • Private Sector Businesses / Organizations

 

The Insider Threat Program Training Course Is Designed For Individuals Who Are Responsible For, Or Involved In;

  • Chief Executive Officers (CEO) / Senior & Mid Level Managers

  • Insider Threat Program Manager

  • Insider Threat Security Analyst

  • Insider Threat Program Support Personnel

  • Computer Security Incident Response Team Personnel

  • Security Directors

  • Corporate Anti-Fraud Investigator / Certified Fraud Examiners

  • Counterintelligence Investigators

  • Antiterrorism / Force Protection (AT/FP)

  • Facilities Security Officers

  • Human Resources, Personnel Security Specialists

  • Chief Information Officers (CIO)

  • Cyber Security Program Manager

  • Information Technology (IT) Administrators

  • Network Security Administrators

  • Chief Information Security Officers (CISO)

  • Information Systems Security Managers, Officers (ISSM), (ISSO)

  • Information Assurance Managers (IAM), Officers (IAO)

  • Chief Risk Offers

  • Contracting Officers (COTR)

  • Legal / General Counsel

  • Office Of Inspector General

 

Insider Threat Program Training Course Key Learning Objectives
The Insider Threat Program (ITP) Training Course is a 2 day course.

Students Will Learn:

  • Insider Threat Terminology

  • How Damaging And Costly An Insider Threat Incident Can Incident Can Be (Case Studies / Examples Of Different Types Of Insider Threats)

  • The Behavioral Indicators Of Concern To An Insider Threat Program (Witting, Unwitting)

  • The Security Policies And Procedures Needed To Build A Foundation Of Security For The Protection Of The Organization Assets And Insider Threat Risk Mitigation

  • The Importance Of Gaining Buy-In From Senior Management And Defining The Scope Of An Insider Threat Program

  • The Essential Elements Needed For Successful Insider Threat Program Development And Insider Threat Risk Mitigation

  • How To Develop An Insider Threat Program Per NISPOM Conforming Change 2 Requirements (ITP Blueprint)

  • Why Going Beyond NISPOM Conforming Change 2 Requirements Is Essential For Successful Insider Threat Risk Mitigation

  • How To Create An Insider Threat Risk Management Framework / Insider Threat Program Hub / Working Group

  • What Are The Essential Data Sources That Will Support An Insider Threat Program (Data Collection & Analysis, Technical, Non-Technical)

  • How To Develop An Insider Threat Program Policy (Templates Supplied)

  • How To Create An Insider Threat Program Concept Of Operations (CONOPS) (Template Supplied)

  • The Importance Of Creating Insider Threat Program NDA's, Rules Of Behavior (Template Supplied)

  • How To Build Insider Threat Awareness Into The Workforce To Detect And Report Potential Insider Threats (Insider Threat Awareness DVD's Provided)

  • How To Detect Activity Indicative Of Insider Threat Behavior With User Activity Monitoring Tools

  • How To Handle Insider Threat Inquiries, Investigations & Case Management

  • The Technical / Non-Technical Threats That Can Be Utilized By Insiders For Malicious Purposes

  • How To Conduct Insider Threat Risk Assessment To Identify Vulnerabilities

Link To:

Insider Threat Program Training Course Brochure

 

 

Insider Threat Security Specialist Exam
The Insider Threat Program Training Course concludes with an exam. The Insider Threat Security Specialist Exam is unique and was designed to exclusively validate a student’s knowledge of;

  • National Insider Threat Policy - NISPOM Conforming Change 2 Requirements.

  • Developing, Implementing, Managing or Supporting an Insider Threat Program using an Insider Threat Program Risk Management Framework.

  • Assessing an existing Insider Threat Program for weaknesses and making enhancements.

  • Mitigation strategies used to protect an organization from Espionage and Insider    Threat.

  • Providing Insider Threat Awareness Training and Reporting Guidance to the    organizations workforce.

  • The exam consists of multiple choice, matching and true / false questions. Unlike other security certifications and training courses that are Pass / Fail, the instructor will work with students until they pass the exam, at no additional charge.

Insider Threat Security Specialist Certificate
The ITSS Certificate Will Validate And Provide Confidence To Employers That The ITSS;

  • Understands the minimum standards and guidance for implementation of an Insider Threat Program per National Insider Threat Policy / NISPOM Conforming Change 2.

  • Can effectively communicate with the many individuals that support an Insider Threat Program / Insider Threat Program Working Group.

  • Can conduct Insider Threat Risk Assessment to identify vulnerabilities, and provide actionable risk mitigation strategies to detect, deter and mitigate Insider Threats.

 

Insider Threat Risk Assessment And Mitigation (ITRAM) Handbook
Students attending the Insider Threat Program Training Course receive an ITRAM Handbook. (140+ Pages)
The ITRAM Handbook Provides;

  • Guidance for developing and evaluating an organization’s Insider Threat Program.

  • Numerous checklists that provide an organization with the ability to assess its vulnerability to Insider Threats.

  • Mitigation strategies, best practices and safeguards focused on addressing     organizational weaknesses in an effort to combat the Insider Threat.

 

Insider Threat Program Training Course Student DVD Toolkit

  • The DVD is filled with the training presentations and many useful resources; Insider Threat Program Policy templates, Insider Threat Program Support Personnel Non-Disclourse Agreement template, Insider Threat Program Information Sharing MOU-MOA template, Insider Threat Awareness and Education materials and other resources to help develop, implement and manage an Insider Threat Program.

  • Insider Threat Defense is currently the only company that provides students with an Insider Threat Program Development Toolkit / DVD.

 

Course Schedule / Classroom Locations / Pricing / Enrollment
Currently the Insider Threat Program Training Course is offered at various locations in the Washington, DC Metropolitan area, Florida and locations throughout the U.S.

 

The Insider Threat Program Training Course can be purchased specifically for your organization. We will come to your location to present the course.

 

NCMS Chapters

Interested in having the Insider Threat Program Training Course taught to your NCMS Chapter? Please call to discuss further.

 

 

Cost

Special Pricing:                  $795.00 (Limited Time Offer)

Normal Cost Per Person: $1,395.00

We accept credit cards, checks and purchase orders.

 

 

Course Schedules / Locations / Registration

 

Location

Dulles, Virginia

 

Date
Tuesday, May 24, 2016 To Wednesday, May 25, 2016

Time
8:00AM To 4:30PM

Location
Southland Industries
22340 Dresden Street
Suite 177
Dulles, VA 20166

Registration Link
(Hotel Information Will Be Found On Registration Lick)

 

 

-----------------------------------------------------------------------------------------------------------------------------

 

Location
Austin, Texas

Date
Monday, July 18, 2016 To Tuesday, July 19, 2016

Time
8:00AM To 5:00PM

Address
Applied Research Laboratories - University of Texas At Austin
10000 Burnet Road
Austin, TX 78758

 

 

Registration Link

 

 

 

 

Security Certification Credits (CPE)
Please see the link below regarding Security Certification Credits (CPE's) for attending the Insider Threat Program Training Course.
Security Certifications CPE Credits-Requirements

DoD 8570.01M Information Assurance Workforce Improvement Manual Training-Continuing Education Requirements

 

 

Insider Threat Defense Past Performance
Insider Threat Defense is excited to announce that the following organizations / individuals have attended the the Insider Threat Program Development Training Course;

* White House National Security Council
* FBI
* Defense Criminal Investigate Service
* Defense Security Service
* OPM – Federal Investigative Services
* Government Accountability Office
* Social Security Administration

* Centers For Disease Control & Prevention
 

* National Nuclear Security Administration
* U.S. Cyber Command
* U.S. Army Enterprise NetOps
* Army Signal Command
* Marine Corps Intelligence Activity
* Texas A&M University
* University of Massachusetts Lowell
* Royal Canadian Mounted Police

 

* American Express
* Home Depot
* Equifax
* UPS
* Georgia Power
* Delta Airlines
* Boeing Integrated Information Systems
* Raytheon / Raytheon BBN Technologies
* General Dynamics Mission Systems
* EMC Corporation
* L-3 Communications
* General Electric
* BAE Systems
* Ernst & Young
* MITRE
* Bechtel
* AECOM Technology Corporation
* Stinger Ghaffarian Technologies
* Mercer Engineering Research Center
* Lockheed Martin, Missiles & Fire Control
* AT&T Government Solutions Security
* Booz Allen Hamilton
* RS Microwave Company, Inc.
* DRS Technologies
* Thales Defense & Security
* Honeywell
* Mason Harriman Group
* Ames Rubber Corporation
* Microwave Development Laboratories, Inc.
* American Science & Engineering, Inc.
* Hydroid - Kongsberg Maritime
* Solidus Technical Solutions
* QinetiQ North America
* Rochester Electronics
* Mercury Systems, Inc.
* KAMAN Corporation
* LinQuest Corporation
* Fiber Materials Inc. |
* Navistar Defense
* Oshkosh Corporation
* Procon Consulting
* MorphoTrust USA
* Applied Communication Sciences
* RIVA Networks
* SciTec, Inc.
* Envision Innovative Solutions, Inc.
* DynCorp International, LLC
* Savit Corporation

* And More...... (Full Client Listing)

 

 

Student Comments

Past students are rating the Insider Threat Program Training in the "Above Average" to "Excellent" Category. Student comments are stating that the training is one the most comprehensive, structured, holistic, resourceful and affordable courses available. (Insider Threat Program Managers References-Contact Information, Provided Upon Request)

Insider Threat Program Training Course - Student Evaluations

 

 

 

Recognition / Award For Insider Threat Program Training Course Website
We are also proud to announce that our Insider Threat Program Training Course website won an award from the Federal Information Systems Security Educators' Association (FISSEA), for its design, uniqueness and usefulness.

 


Insider Threat Program Training / Insider Threat Security Specialist Education Baseline Standards
The CEO of Insider Threat Defense is an industry recognized Subject Matter Expert and Public Speaker on Insider Threats. Insider Threat Defense is aiming to set the baseline standard for Insider Threat Program Training / Insider Threat Security Specialist education. Currently there are no such baseline standards.



Insider Threat Program Training Course /  Insider Threat Security Specialist Certificate Development
The CEO of Insider Threat Defense worked for the DoD Insider Threat Counterintelligence Group (DoD ITCIG) from 2009-2011. He was one of the original members of the DoD ITCIG that assisted the DoD in establishing a comprehensive and structured DoD Enterprise Insider Threat Program Model that integrated the security disciplines of Counterintelligence (CI), Security and Information Assurance (IA).

 

The DoD Insider Threat Program Model defined the baseline activities to be conducted by DoD Combatant Commands, Services and Agencies to support their Insider Threat Programs. Much of the work done at the DoD ITCIG laid the foundation for the National Insider Threat Policy and other related documentation to support Insider Threat Program development and implementation.

 

After doing extensive research into existing training courses for Insider Threat Program development, and speaking with various CI, Security and IA experts from across the DoD and IC, the overall consensus and feedback was that an Insider Threat Program Training Course / Insider Threat Security Specialist Certificate was desperately needed. As the Insider Threat Program Training Course was developed, input was received from numerous CI, Security and IA experts.

 

The Insider Threat Program Development Training Course has been peer reviewed by Insider Threat Subject Matter Experts who support Insider Threat Programs for U.S. Government Agencies, the Department of Defense, Intelligence Community Agencies, Defense Industrial Base Contracts, large and small businesses.

 

 

free hit counters

 

 
 

         

Copyright © 2014- INSIDER THREAT DEFENSE - All Rights Reserved - Legal Notice