Insider Threat Program Development, Management, and Operations

Public Seminar

Price: $799

Date: November 9, 2016

Time: 8:30AM - 3:30PM EDT

Address: Johns Hopkins APL

11100 Johns Hopkins Rd.

Laurel, MD 20723

Credits: 6-CPE credits

plus certificate

First 50 Registrants Receive a FREE ($500 value):

* 60-minute consultation

* Whiteboarding session
* Copy of my book entitled 
Insider Threat Program

Insider Threat Program Development, Management, and Operations Seminar

November 9, 2016

8:30AM - 3:30PM EDT

Johns Hopkins Applied Physics Lab

11100 Johns Hopkins Road

​Laurel, MD 20723

Insider Threat Management Group, LLC.

About the Instructor

                                 Mr. Thompson is a noted author,                                        speaker, and the Founder and                                            Director of the Insider Threat                                              Training Academy and the Founder                                    and President of the Insider Threat                                    Management Group, LLC, which                                        provides training and strategic                                            insider risk management advisory services to the public and private sector. He possesses over 15 years’ experience investigating, prosecuting, and managing insider threats and is widely sought-after for his unique expertise. He is a former federal prosecutor and senior government official who held executive positions with several agencies including the FBI, DoD, and DNI. He is a pioneer in the field of insider risk management, serving as a frequent guest speaker and thought leader on a variety of security topics. Mr. Thompson serves as a trusted advisor for the highest levels of government as well as private sector C-suite and Board of Directors alike. He is a member of the Maryland Bar.

Shawn M. Thompson, Esq.

​This interactive and practical seminar combines a comprehensive overview of how to manage insider threats and the legal considerations and implications of executing an insider threat program.  Learn how to initiate, develop, and implement a legally defensible insider threat program. This one-day seminar helps you gain confidence and expertise in managing risks posed by trusted insiders. You’ll gain a comprehensive understanding of the ten insider threat program components and the legal considerations affecting each.  


* 6 CPE credits plus certificate
* Learn how to protect corporate assets and individual privacy
* Know what constitutes an “insider threat program”
* Discuss how to create an insider threat program with ITMG’s detailed 11-step process
* Learn how to prevent insider threats through a close examination of employee background and continuous evaluation processes and procedures
* Learn how to detect insider threats by employing technical and non-technical solutions
* Explore employee investigation best practices
* Examine insider incident response measures - what is available, how should you employ them and when should they be employed
* Develop legally compliant policies
* Confidently manage insider risks
* Receive Practice Guides for each of the 10 components—includes charts, checklists, templates, best practices, legal considerations, and more!

Who should attend

This training is designed for anyone involved in the development, oversight, or operation of an insider threat program including: executives, HR and legal departments, CISOs,security managers, and practitioners.

This seminar will teach you all you need to know regarding how to manage insider risk in a legally defensible manner through the detailed discussion, experience driven, and materially supported objectives below:

Insider Threat Operations

Framework. Explore the rules, policies, and procedures affecting insider threat program operations.
Insider Vetting. Delve into the boundaries and best practices of employee background investigations and continuous evaluation procedures to ensure the trustworthiness of your insider network.
Insider Monitoring. Examine the world of employee monitoring - solutions, practices, procedures, policies - and how to apply them in a legally defensible manner.
Insider Investigations. Review procedures and best practices for uncovering insider threat behaviors and activities and how to apply them in a legally defensible manner. 
Insider Mitigations. Discuss procedures for responding to insider threats including criminal, civil, administrative, and internal actions.

Insider Threat Program Development and Management

Components. Define insider threat program components, initial and full operating capabilities, and supporting objectives.
Initiate. Learn how to baseline your existing security and cyber capabilities and how to develop the necessary foundation.
Develop. Understand how to create insider threat components and how to align them with applicable business objectives using a risk-based approach.
Implement. Acquire the knowledge to operationalize your insider threat program in the most efficient and cost-effective manner.