Insider Threat Program Development, Management, and Operations
Date: November 9, 2016
Time: 8:30AM - 3:30PM EDT
Address: Johns Hopkins APL
11100 Johns Hopkins Rd.
Laurel, MD 20723
Credits: 6-CPE credits
First 50 Registrants Receive a FREE ($500 value):
* 60-minute consultation
* Whiteboarding session
* Copy of my book entitled Insider Threat Program
Insider Threat Program Development, Management, and Operations Seminar
November 9, 2016
8:30AM - 3:30PM EDT
Johns Hopkins Applied Physics Lab
11100 Johns Hopkins Road
Laurel, MD 20723
Insider Threat Management Group, LLC.
About the Instructor
Mr. Thompson is a noted author, speaker, and the Founder and Director of the Insider Threat Training Academy and the Founder and President of the Insider Threat Management Group, LLC, which provides training and strategic insider risk management advisory services to the public and private sector. He possesses over 15 years’ experience investigating, prosecuting, and managing insider threats and is widely sought-after for his unique expertise. He is a former federal prosecutor and senior government official who held executive positions with several agencies including the FBI, DoD, and DNI. He is a pioneer in the field of insider risk management, serving as a frequent guest speaker and thought leader on a variety of security topics. Mr. Thompson serves as a trusted advisor for the highest levels of government as well as private sector C-suite and Board of Directors alike. He is a member of the Maryland Bar.
Shawn M. Thompson, Esq.
This interactive and practical seminar combines a comprehensive overview of how to manage insider threats and the legal considerations and implications of executing an insider threat program. Learn how to initiate, develop, and implement a legally defensible insider threat program. This one-day seminar helps you gain confidence and expertise in managing risks posed by trusted insiders. You’ll gain a comprehensive understanding of the ten insider threat program components and the legal considerations affecting each.
* 6 CPE credits plus certificate
* Learn how to protect corporate assets and individual privacy
* Know what constitutes an “insider threat program”
* Discuss how to create an insider threat program with ITMG’s detailed 11-step process
* Learn how to prevent insider threats through a close examination of employee background and continuous evaluation processes and procedures
* Learn how to detect insider threats by employing technical and non-technical solutions
* Explore employee investigation best practices
* Examine insider incident response measures - what is available, how should you employ them and when should they be employed
* Develop legally compliant policies
* Confidently manage insider risks
* Receive Practice Guides for each of the 10 components—includes charts, checklists, templates, best practices, legal considerations, and more!
Who should attend
This training is designed for anyone involved in the development, oversight, or operation of an insider threat program including: executives, HR and legal departments, CISOs,security managers, and practitioners.
This seminar will teach you all you need to know regarding how to manage insider risk in a legally defensible manner through the detailed discussion, experience driven, and materially supported objectives below:
Insider Threat Operations
Framework. Explore the rules, policies, and procedures affecting insider threat program operations.
Insider Vetting. Delve into the boundaries and best practices of employee background investigations and continuous evaluation procedures to ensure the trustworthiness of your insider network.
Insider Monitoring. Examine the world of employee monitoring - solutions, practices, procedures, policies - and how to apply them in a legally defensible manner.
Insider Investigations. Review procedures and best practices for uncovering insider threat behaviors and activities and how to apply them in a legally defensible manner.
Insider Mitigations. Discuss procedures for responding to insider threats including criminal, civil, administrative, and internal actions.
Insider Threat Program Development and Management
Components. Define insider threat program components, initial and full operating capabilities, and supporting objectives.
Initiate. Learn how to baseline your existing security and cyber capabilities and how to develop the necessary foundation.
Develop. Understand how to create insider threat components and how to align them with applicable business objectives using a risk-based approach.
Implement. Acquire the knowledge to operationalize your insider threat program in the most efficient and cost-effective manner.
2016 Copyright. Insider Threat Management Group, LLC. All Rights Reserved