Added: (Sun Jul 20 2014)
Pressbox (Press Release) -
Silver Spring, Maryland: Insider Threat Defense (ITD) announced that it has developed and is offering a specialized Instructor Led Insider Threat Program (ITP) Training Course. The ITP Training Course was developed in response to the many recent data breaches affecting the U.S. Government (WikiLeaks, NSA Breach) and businesses. The course provides organizations with a proven and comprehensive enterprise framework for mitigating Insider Threats.
Insider Threat Program Training Course
The Insider Threat Program Training Course was developed in accordance with Executive Order (EO) 13587, National Insider Threat Policy (NITP) and other supporting regulations
The ITP Training Course is targeting; DoD, Intelligence Community (IC) Agencies and Defense Industrial Base Contractors responsible for protecting classified information, and businesses protecting sensitive information.
The ITP Training Course is designed for individuals who are responsible for, or involved in; 1) Insider Threat Program Management, Insider Threat Program Personnel, Corporate Anti-Fraud Programs. 2)The security disciplines of Counterintelligence, Personnel Security, Physical Security, Antiterrorism/Force Protection (AT/FP), Information Assurance, Information Security, Information System Security, Cyber Security Programs. 3) Anyone involved in supporting Insider Threat Programs / Corporate Anti-Fraud Programs; Chief Information Officer (CIO), Chief Information Security Officer (CISO), Network Security / IT Security, Information System Security Manager/Officer, Computer Security Incident Response Team, Human Resources, Privacy Office, Legal/General Counsel.
This 3 day ITP Training Course covers 17 different modules, is well structured and comprehensive.
The ITP Training Course Will Teach Individuals How To;
•Develop, implement, manage or support an ITP per National Insider Threat Policy requirements.
•Build an Insider Threat Program Risk Management Framework that will support the ITP.
•Assess an existing ITP for weaknesses and make enhancements.
•Use various Insider Threat Checklists to identify Insider Threat risks, vulnerabilities and weaknesses within an organization.
•Use risk mitigation strategies and actionable steps that can be taken to detect, deter and mitigate Insider Threats within an organization.
•Develop and implement an Insider Threat Awareness and Reporting Program.