Developing, managing, and implementing an insider threat program requires a multi-disciplinary approach. Executing this approach requires an understanding of the myriad legal issues and ramifications of operating an insider threat program. These issues are, however, unique and esoteric and require multi-disciplinary experiences to fully appreciate and understand all of the legal implications. ITMG's training program was created by former federal prosecutor and leading insider threat law expert, noted speaker, author, and consultant, Shawn M. Thompson, Esq.(Bio). Mr. Thompson brings nearly two decades of insider threat legal, operational, and management experience to make this training course truly one-of-a-kind.
Course overview: The course examines the foundational considerations of an insider threat program including: regulatory framework, requirements and mandates, and regulatory and legal incentives. The course then explores operational legal issues arising with employee vetting, employee monitoring, employee investigations, and mitigation procedures.
Target audience:This training is designed for anyone involved in the development, oversight, and operation of an insider threat program including: executives, HR and legal departments, security managers, and security practitioners.
Course objectives and benefits: Attendees will acquire a comprehensive understanding of the legal considerations pertaining to the development and implementation of an insider threat program. This understanding will foster operational efficiency through the application of sound and legally defensible insider threat management practices, solutions, and procedures, leading to a reduction in liabilities and greater ROI.
Length: The training course is a half-day (4 hours).
Delivery and pricing: Training is provided on-site at your location or at a convenient off-site location of your choosing. Pricing is based on the number of attendees. Contact us today for a quote and ask us about available bulk discount rates.
Course content: The course is divided into three components: Programmatic Considerations, Proactive Operational Considerations, Reactive Operational Considerations. DOWNLOAD COURSE CONTENT
Course Overview:The course covers four primary insider threat modules designed to instruct attendees on how to create a fully operational insider threat program - Framework and Objectives, Program Initiation, Program Development, and Program Implementation. Modules cover how to develop, manage, and support the ten primary components of an effective insider threat program and how to develop policies and procedures and align them with business objectives using ITMG's proprietary 11-step Insider Threat Management process.
Target Audience:NISPOM regulated businesses will find this course especially useful, but any organization seeking to create an insider threat program will benefit.
Length: This is a half-day course.
Delivery and Pricing:Courses are taught at the client site or convenient location of their choosing. Pricing is dependent upon number of attendees. Discounted group rates are available.
Course Content: DOWNLOAD COURSE OUTLINE
Insider Threat Training
This course was designed for security managers and practitioners charged with creating, implementing, and operating insider threat programs.
This course meets the new NISPOM Conforming Change 2 requirements and is also effective for any entity seeking to create an insider threat program.
Webinar: Balancing Privacy and Protection
Insider Threat Management
Insider Threat Law Training
Webinar: Introduction to Insider Threat Management
2016 Copyright. Insider Threat Management Group, LLC. All Rights Reserved