Insider Threats Awareness Training


Managers and employees do not always realize that some “colleagues” consider the exploitation of organizational weaknesses a high-reward activity that serves their personal interests better than loyalty to the employer. This training ensures that all employees understand that the risk of insider threats is real and that its consequences may be severe. They learn to recognize red flags, suspicious activity, and explicit insider threat activity as well as how to respond to it once they have witnessed it. In case of a potential recruitment attempt from an outsider, employees learn how to respond to it and how to report it and warn their organization.

This type of threat is more important for organizations that are part of the critical infrastructure and industries where intellectual property and the protection of sensitive information are critical elements for their operations.

We understand that maintaining a positive organizational culture is important. Therefore, we discuss this topic with the necessary discretion and in a light of shared responsibility towards the protection of organizational assets and information.

Target Audience

The program is beneficial to all managers and employees working in companies and organizations of the public and the private sector.


One hour to one day, depending on the needs, the content of the program and the case studies. We always tailor the program to the needs of each client.


Christina Lekati, psychologist, social engineering expert. To learn about her you may visit:

Christina Lekati

Course Synopsis:


1. Who are the insider threats?

2. Motives of insider threats

3. Consequences

Insider Threat Activity

1. How do insider threats operate?

2. Types of insider threat activity

3. Who could be an insider threat? (colleagues, contractors, business partners)

Recognizing the signs

1. Suspicious activity

2. Suspicious comments

3. Explicit insider threat activity – Red Flags

4. Disgruntlement & unmet expectations

5. Behavioral precursors

Responding to suspicious activity

1. Best-practice responses

2. What you should not do

3. Reporting process

Recruitment efforts

1. Recruitment efforts from third parties, business partners, or other insiders

2. What will you be offered?

3. Consequences

4. Responding to a recruitment attempt

5. Reporting

Case Studies

Concluding Remarks

For more information, you may contact us.

Terms and conditions

You may visit:

Cyber Security Training

Cyber security is ofter boring for employees. We can make it exciting.

Online Cybersecurity Training

Online Training

Recorded on-demand training and live webinars.

In-house Cybersecurity Training

In-house Training

Engaging training classes and workshops.

Social Engineering Cybersecurity Training

Social Engineering

Developing the human perimeter to deal with cyber threats.

For the Board Cybersecurity Training

For the Board

Short and comprehensive briefings for the board of directors.

Cybersecurity Assessment


Open source intelligence (OSINT) reports and recommendations.

High Value Targets Cybersecurity Training

High Value Targets

They have the most skilled adversaries. We can help.

Which is the next step?


You contact us


We discuss


Our proposal


Changes and approval


We deliver

Cyber Risk GmbH, Cyber Risk Awareness and Training