Insider Threats Awareness Training



Overview

Managers and employees do not always realize that some “colleagues” consider the exploitation of organizational weaknesses a high-reward activity that serves their personal interests better than loyalty to the employer. This training ensures that all employees understand that the risk of insider threats is real and that its consequences may be severe. They learn to recognize red flags, suspicious activity, and explicit insider threat activity as well as how to respond to it once they have witnessed it. In case of a potential recruitment attempt from an outsider, employees learn how to respond to it and how to report it and warn their organization.

This type of threat is more important for organizations that are part of the critical infrastructure and industries where intellectual property and the protection of sensitive information are critical elements for their operations.

We understand that maintaining a positive organizational culture is important. Therefore, we discuss this topic with the necessary discretion and in a light of shared responsibility towards the protection of organizational assets and information.


Target Audience

The program is beneficial to all managers and employees working in companies and organizations of the public and the private sector.


Duration

One hour to one day, depending on the needs, the content of the program and the case studies. We always tailor the program to the needs of each client.


Instructor

Christina Lekati, psychologist, social engineering expert. To learn about her you may visit: https://www.cyber-risk-gmbh.com/About_Christina_Lekati.html

Christina Lekati


Course Synopsis:

Introduction

1. Who are the insider threats?

2. Motives of insider threats

3. Consequences


Insider Threat Activity

1. How do insider threats operate?

2. Types of insider threat activity

3. Who could be an insider threat? (colleagues, contractors, business partners)


Recognizing the signs

1. Suspicious activity

2. Suspicious comments

3. Explicit insider threat activity – Red Flags

4. Disgruntlement & unmet expectations

5. Behavioral precursors


Responding to suspicious activity

1. Best-practice responses

2. What you should not do

3. Reporting process


Recruitment efforts

1. Recruitment efforts from third parties, business partners, or other insiders

2. What will you be offered?

3. Consequences

4. Responding to a recruitment attempt

5. Reporting


Case Studies

Concluding Remarks


For more information, you may contact us.


Terms and conditions

You may visit: https://www.cyber-risk-gmbh.com/Terms.html





Cyber Security Training

Cyber security is ofter boring for employees. We can make it exciting.


Online Cybersecurity Training

Online Training

Recorded on-demand training and live webinars.

In-house Cybersecurity Training

In-house Training

Engaging training classes and workshops.

Social Engineering Cybersecurity Training

Social Engineering

Developing the human perimeter to deal with cyber threats.


For the Board Cybersecurity Training

For the Board

Short and comprehensive briefings for the board of directors.


Cybersecurity Assessment

Assessments

Open source intelligence (OSINT) reports and recommendations.


High Value Targets Cybersecurity Training

High Value Targets

They have the most skilled adversaries. We can help.





Which is the next step?

1

You contact us

2

We discuss

3

Our proposal

4

Changes and approval

5

We deliver







Cyber Risk GmbH, Cyber Risk Awareness and Training