Combating The Insider Threat Problem The Insider Threat Program Training Course
™ was developed in response
to the many past and current data breaches affecting U.S. Government
Agencies (USGA) WikiLeaks, NSA Breach), and many other data breaches
that have affected businesses and private sector organizations.
Whether it is a data breach caused by a malicious Insider working
for a USGA, business, or private sector organization, the damages
can be costly and severe.
This unique and specialized Insider Threat Program
Training Course will provide USGA, businesses and private sector
organizations with the knowledge and resources to combat the
continued Insider Threat problem.
Insider Threat Programs For The U.S. Government The Insider Threat Program Training Course
Was Developed In
Executive Order (EO) 13587, National Insider Threat
National Security Systems From Insider Threat
Department Of Defense (DoD) Instruction
5240.26-Countering Espionage, International Terrorism, And The
Counterintelligence (CI) Insider Threat
Navy Insider Threat
Army Insider Threat Program-Directive
Force Instruction 16-1402 Insider Threat Program Management
The Insider Threat Program Training Course
will meet and
the National Insider Threat Policy and NISPOM Conforming
Change 2 - Insider Threat Program requirements for establishing an Insider Threat
The Insider Threat Program Training Course leverages
existing federal laws, statutes, authorities, policies, programs,
and resources in order to counter the Insider Threat. (FISMA, NIST,
DNI, CNSS, DoD, OMB).
Insider Threat Programs For Defense Industrial Base (DIB)
Businesses that support the DoD,
such as Defense Industrial Base (DIB) contractors, must adhere to the National Industrial Security Program
Operating Manual (NISPOM).
NISPOM Conforming Change 2
requires DIB contractors to have Insider Threat Programs.
Contractors must have a written Insider Threat Program
Plan in place to begin implementing an Insider Threat
Program, no later then November 30, 2016.
Insider Threat Programs For Businesses / Private Sector
Organizations No mandates, standards, or models exist for Insider Threat Programs
for businesses or private sector organizations. Therefore, it is
difficult for businesses and organizations to develop or assess
their Insider Threat Programs. Insider Threat Programs for
businesses and private sector organizations are critical for
preventing, detecting and mitigating the Insider Threat.
Insider Threat Defense
™ has taken our knowledge and expertise in
developing a U.S. Government, DoD, IC Insider Threat Program Model,
an developed an Insider Threat Program Risk Management Framework (ITP
RMF) for businesses and private sector organizations. The ITP RMF
can be used and tailored for any large or small business or
No evaluations of Insider Threat Programs for the private sector had
been conducted until the Intelligence And National Security Alliance
(INSA) produced a report titled:
Preliminary Examination Of Insider Threat Programs In The U.S.
Private Sector. We have taken the weaknesses found in the
private sector Insider Threat Program report and incorporated the
recommendations into our Insider Threat Program Risk Management
Framework for businesses and organizations. Insider Threat Defense
is not aware of any other company that has produced such a unique,
comprehensive and structured Insider Threat Program Model for
businesses and private sector organizations.
Insider Threat Program Training Course Target Audience
Intelligence Community Agencies
Industrial Base Contractors
Airline Security Professionals
Sector Businesses / Organizations
The Insider Threat Program Training Course
Is Designed For
Individuals Who Are Responsible For, Or Involved In;
Insider Threat Security
The Insider Threat Program Training Course concludes with an exam.
The Insider Threat Security Specialist Exam is unique and was
designed to exclusively validate a student’s knowledge of;
Insider Threat Policy - NISPOM Conforming Change 2 Requirements.
Developing, Implementing, Managing or Supporting an Insider Threat
Program using an Insider Threat Program Risk Management Framework.
Assessing an existing Insider
Threat Program for weaknesses and making enhancements.
Mitigation strategies used to protect an organization from Espionage
and Insider Threat.
Insider Threat Awareness Training and Reporting Guidance to the
The exam consists of multiple choice,
matching and true / false questions. Unlike other security
certifications and training courses that are Pass / Fail, the
instructor will work with students
until they pass the exam, at no
Insider Threat Security Specialist Certificate
Certificate Will Validate And Provide Confidence To Employers That
Understands the minimum standards
and guidance for implementation of an Insider Threat Program per
National Insider Threat Policy / NISPOM Conforming Change 2.
Can effectively communicate with
the many individuals that support an Insider Threat Program /
Insider Threat Program Working Group.
Can conduct Insider Threat Risk
Assessment to identify vulnerabilities, and provide actionable
risk mitigation strategies to detect, deter and mitigate Insider
Insider Threat Risk Assessment And Mitigation (ITRAM) Handbook
™ Students attending the Insider Threat Program Training Course
receive an ITRAM Handbook. (140+ Pages)
The ITRAM Handbook Provides;
for developing and evaluating an organization’s Insider Threat
checklists that provide an organization with the ability to assess
its vulnerability to Insider Threats.
strategies, best practices and safeguards focused on addressing organizational weaknesses in an effort to combat the Insider Threat.
Insider Threat Program Training Course Student DVD
The DVD is
filled with the training presentations and many useful
resources; Insider Threat Program Policy templates, Insider
Threat Program Support Personnel Non-Disclourse Agreement
template, Insider Threat Program Information Sharing MOU-MOA
template, Insider Threat Awareness and Education materials and
other resources to help develop, implement and manage an Insider
Insider Threat Defense is
currently the onlycompany that
provides students with an Insider Threat Program Development
Toolkit / DVD.
Course Schedule / Classroom Locations / Pricing /
Currently the Insider Threat Program Training Course is
offered at various locations in the Washington, DC Metropolitan area,
locations throughout the U.S.
The Insider Threat Program
Course can be purchased specifically for your organization. We will
come to your location to present the course.
Interested in having the
Insider Threat Program Training Course taught to your NCMS Chapter?
Please call to discuss further.
$795.00 (Limited Time Offer)
Per Person: $1,395.00
credit cards, checks and purchase orders.
/ Locations / Registration
Date Monday, September 19 and
Tuesday, September 20, 2016
Time 8:00AM To 5:00PM
Address Rockwell Automation, Inc.
1201 South Second Street
Milwaukee, WI 53204 REGISTRATION LINK FOR
Date Thursday, October 6, 2016
To Friday, October 7, 2016
Time 8:00AM To 5:00PM
Address University of Central
Office of Research & Commercialization
12201 Research Parkway, Room 211
Orlando, Florida 32826
Insider Threat Defense Past Performance Insider Threat Defense is excited to announce that the
following organizations / individuals have attended the the Insider
Threat Program Development Training Course;
* White House National Security Council
* Defense Criminal Investigate Service
* Defense Security Service
* OPM – Federal Investigative Services
* Government Accountability Office
* Social Security Administration
* Centers For Disease Control & Prevention
* National Nuclear Security Administration
* U.S. Cyber Command
* U.S. Army Enterprise NetOps
* Army Signal Command
* Marine Corps Intelligence Activity
* Texas A&M University
* University of Massachusetts Lowell
* Royal Canadian Mounted Police
* American Express
* Home Depot
* Georgia Power
* Delta Airlines
* Boeing Integrated Information Systems
* Raytheon / Raytheon BBN Technologies
* General Dynamics Mission Systems
* EMC Corporation
* L-3 Communications
* General Electric
* BAE Systems
* Ernst & Young
* AECOM Technology Corporation
* Stinger Ghaffarian Technologies
* Mercer Engineering Research Center
* Lockheed Martin, Missiles & Fire Control
* AT&T Government Solutions Security
* Booz Allen Hamilton
* RS Microwave Company, Inc.
* DRS Technologies
* Thales Defense & Security
* Mason Harriman Group
* Ames Rubber Corporation
* Microwave Development Laboratories, Inc.
* American Science & Engineering, Inc.
* Hydroid - Kongsberg Maritime
* Solidus Technical Solutions
* QinetiQ North America
* Rochester Electronics
* Mercury Systems, Inc.
* KAMAN Corporation
* LinQuest Corporation
* Fiber Materials Inc. |
* Navistar Defense
* Oshkosh Corporation
* Procon Consulting
* MorphoTrust USA
* Applied Communication Sciences
* RIVA Networks
* SciTec, Inc.
* Envision Innovative Solutions, Inc.
* DynCorp International, LLC
* Savit Corporation
Past students are rating the Insider Threat Program Training in the
"Above Average" to "Excellent" Category.
Student comments are stating that the training is one the most
comprehensive, structured, holistic, resourceful and affordable
courses available. (Insider
Threat Program Managers References-Contact Information, Provided
Recognition / Award For Insider Threat Program Training Course
Website We are also proud to announce that our Insider Threat Program
Training Course website won an award from the Federal Information
Systems Security Educators' Association (FISSEA), for its
design, uniqueness and usefulness.
Insider Threat Program Training / Insider Threat Security Specialist
Education Baseline Standards
The CEO of Insider Threat Defense is an industry recognized Subject
Matter Expert and
Public Speaker on Insider Threats. Insider Threat Defense
is aiming to set the baseline standard for Insider Threat Program
Training / Insider Threat Security Specialist education. Currently
there are no such baseline standards.
Insider Threat Program Training Course / Insider Threat Security Specialist
The CEO of Insider Threat Defense worked for the DoD Insider Threat
Counterintelligence Group (DoD ITCIG) from 2009-2011. He was one of
the original members of the DoD ITCIG that assisted the DoD in
establishing a comprehensive and structured DoD Enterprise Insider
Threat Program Model that integrated the security disciplines of
Counterintelligence (CI), Security and Information Assurance (IA).
The DoD Insider Threat Program Model defined the baseline activities
to be conducted by DoD Combatant Commands, Services and Agencies to
support their Insider Threat Programs. Much of the work done at the
DoD ITCIG laid the foundation for the National Insider Threat Policy
and other related documentation to support Insider Threat Program
development and implementation.
After doing extensive research into
existing training courses for Insider Threat Program development,
and speaking with various CI, Security and IA experts from across
the DoD and IC, the overall consensus and feedback was that an
Insider Threat Program Training Course / Insider Threat Security
Specialist Certificate was desperately needed. As the Insider Threat
Program Training Course was developed, input was received from
numerous CI, Security and IA experts.
The Insider Threat Program
Development Training Course has been peer reviewed by Insider Threat
Subject Matter Experts who support Insider Threat Programs for U.S.
Government Agencies, the Department of Defense, Intelligence
Community Agencies, Defense Industrial Base Contracts, large and