Insider Threat Program Development - Management - Optimization Training


This event qualifies for 16 CPEs


PART 1 of this highly sought after and very comprehensive 2 day training course, will ensure that the ITP Manager and others who support the ITP (Insider Threat Analyst, FSO, CSO, CISO, Human Resources, CIO - IT, Network Security, Counterintelligence Investigators, Mental Health / Behavioral Science Professionals, Legal Etc.), have the Core Knowledge, Blueprint, Resources needed for developing, managing, enhancing an ITP / ITP Working Group.

 

This training will provide students with cost effective strategies, and a Step By Step Blueprint to develop a comprehensive Insider Threat Mitigation (ITM) Framework that will support the ITP. This training is taught from a Real World, Practical and Operational perspective, Vs. other ITP Management Training that is taught from an Academic and Theoretical perspective.

 

This training will provide the comprehensive knowledge and resources to perform an ITP Gap & Optimization Analysis, and conduct an Insider Threat Vulnerability Assessment to discover weaknesses the could enable a Malicious Insider to be successful in their endeavors.

 

This training incorporates the Malicious Insiders Playbook of Malicious Tactics, which mimics the mind of a Malicious Insider to assume their point of view. This will help our students find holes in their organizations security defenses, before a REAL Malicious Insider does.

 

This training course is aligned with and exceeds the requirements for ITP's outlined in the National Insider Threat Task Force (NITTF) Insider Threat Competency Resources Guide, NITTF ITP Maturity Guide, NITTF ITP Full Operating Capability Guide, NISPOM Conforming Change 2, NIST SP 800-53 and other compliance regulations requiring ITM / ITP's.

 

This training is also very well suited for any organization or business that is not required to implement an ITP, but is concerned with employee threat identification and mitigation, and interested in implementing an ITM Framework.

 

PART 2 of this training will provide students with a comprehensive view of the many INTERNAL technical, non-technical and EXTERNAL data sources that will provide the ITP with holistic insights into the risk / threat that an employee may pose to the organization.

 

To support Insider Threat Investigations students will learn how to obtain extensive visibility of potential or malicious employee actions on computer systems and networks, using Insider Threat Detection (ITD) software.

 

Students will be provided with detailed information on the important features to consider when comparing different vendor solutions for ITD software. If you have an existing solution, you will gain valuable insights into the various capabilities of ITD software, and their importance in detecting and mitigating Insider Threats. With this knowledge you will able to perform a gap analysis to evaluate the strengths and weaknesses of your existing ITD software.

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government


This event has no exhibitor/sponsor opportunities


When
Tue-Wed, Jan 30-31, 2024, 8:00am - 5:00pm ET


Cost

Regular:  $1195.00


Where
Johns Hopkins University Applied Physics Laborator
11100 Johns Hopkins Road
Laurel, MD 20723
Get directions


Website
Click here to visit event website


Organizer
Insider Threat Defense Group



Return to search results