Managers and employees do not always realize that some “colleagues” consider the exploitation of organizational weaknesses a high-reward activity that serves their personal interests better than loyalty to the employer. This training ensures that all employees understand that the risk of insider threats is real and that its consequences may be severe. They learn to recognize red flags, suspicious activity, and explicit insider threat activity as well as how to respond to it once they have witnessed it. In case of a potential recruitment attempt from an outsider, employees learn how to respond to it and how to report it and warn their organization.
This type of threat is more important for organizations that are part of the critical infrastructure and industries where intellectual property and the protection of sensitive information are critical elements for their operations.
We understand that maintaining a positive organizational culture is important. Therefore, we discuss this topic with the necessary discretion and in a light of shared responsibility towards the protection of organizational assets and information.
The program is beneficial to all managers and employees working in companies and organizations of the public and the private sector.
30 minutes to 1 day, depending on the needs, the content of the program and the case studies.
Christina Lekati, psychologist, social engineering expert. To learn about her you may visit: https://www.cyber-risk-gmbh.com/About_Christina_Lekati.html
1. Who are the insider threats?
2. Motives of insider threats
Insider Threat Activity
1. How do insider threats operate?
2. Types of insider threat activity
3. Who could be an insider threat? (colleagues, contractors, business partners)
Recognizing the signs
1. Suspicious activity
2. Suspicious comments
3. Explicit insider threat activity – Red Flags
4. Disgruntlement & unmet expectations
5. Behavioral precursors
Responding to suspicious activity
1. Best-practice responses
2. What you should not do
3. Reporting process
1. Recruitment efforts from third parties, business partners, or other insiders
2. What will you be offered?
4. Responding to a recruitment attempt
Terms and conditions
You may visit: https://www.cyber-risk-gmbh.com/Terms.html
For more information, you may contact us.
Cyber security is ofter boring for employees. We can make it exciting.
Recorded on-demand training and live webinars.
Engaging training classes and workshops.
Developing the human perimeter to deal with cyber threats.
Short and comprehensive briefings for the board of directors.
Open source intelligence (OSINT) reports and recommendations.
They have the most skilled adversaries. We can help.