Insider Threats Awareness Training



Overview

Managers and employees do not always realize that some “colleagues” consider the exploitation of organizational weaknesses a high-reward activity that serves their personal interests better than loyalty to the employer. This training ensures that all employees understand that the risk of insider threats is real and that its consequences may be severe. They learn to recognize red flags, suspicious activity, and explicit insider threat activity as well as how to respond to it once they have witnessed it. In case of a potential recruitment attempt from an outsider, employees learn how to respond to it and how to report it and warn their organization.

This type of threat is more important for organizations that are part of the critical infrastructure and industries where intellectual property and the protection of sensitive information are critical elements for their operations.

We understand that maintaining a positive organizational culture is important. Therefore, we discuss this topic with the necessary discretion and in a light of shared responsibility towards the protection of organizational assets and information.


Target Audience

The program is beneficial to all managers and employees working in companies and organizations of the public and the private sector.


Duration

30 minutes to 1 day, depending on the needs, the content of the program and the case studies.


Instructor

Christina Lekati, psychologist, social engineering expert. To learn about her you may visit: https://www.cyber-risk-gmbh.com/About_Christina_Lekati.html


Course Synopsis:

Introduction

1. Who are the insider threats?

2. Motives of insider threats

3. Consequences

Insider Threat Activity

1. How do insider threats operate?

2. Types of insider threat activity

3. Who could be an insider threat? (colleagues, contractors, business partners)

Recognizing the signs

1. Suspicious activity

2. Suspicious comments

3. Explicit insider threat activity – Red Flags

4. Disgruntlement & unmet expectations

5. Behavioral precursors

Responding to suspicious activity

1. Best-practice responses

2. What you should not do

3. Reporting process

Recruitment efforts

1. Recruitment efforts from third parties, business partners, or other insiders

2. What will you be offered?

3. Consequences

4. Responding to a recruitment attempt

5. Reporting

Case Studies

Concluding Remarks


Terms and conditions

You may visit: https://www.cyber-risk-gmbh.com/Terms.html

For more information, you may contact us.




Our Services

Cyber security is ofter boring for employees. We can make it exciting.


Online Training

Recorded on-demand training and live webinars.

In-house Training

Engaging training classes and workshops.

Social Engineering

Developing the human perimeter to deal with cyber threats.


For the Board

Short and comprehensive briefings for the board of directors.


Assessments

Open source intelligence (OSINT) reports and recommendations.


High Value Targets

They have the most skilled adversaries. We can help.





Which is the next step?

1

You contact us

2

We meet and discuss

3

Our proposal

4

Changes and approval

5

We deliver







Cyber Risk GmbH, Cyber Risk Awareness and Training in Switzerland, Germany, Liechtenstein