Overview
Managers and employees do not always realize that some “colleagues” consider the exploitation of organizational weaknesses a high-reward activity that serves their personal interests better than loyalty to the employer. This training ensures that all employees understand that the risk of insider threats is real and that its consequences may be severe. They learn to recognize red flags, suspicious activity, and explicit insider threat activity as well as how to respond to it once they have witnessed it. In case of a potential recruitment attempt from an outsider, employees learn how to respond to it and how to report it and warn their organization.
This type of threat is more important for organizations that are part of the critical infrastructure and industries where intellectual property and the protection of sensitive information are critical elements for their operations.
We understand that maintaining a positive organizational culture is important. Therefore, we discuss this topic with the necessary discretion and in a light of shared responsibility towards the protection of organizational assets and information.
Target Audience
The program is beneficial to all managers and employees working in companies and organizations of the public and the private sector.
Duration
One hour to one day, depending on the needs, the content of the program and the case studies. We always tailor the program to the needs of each client.
Instructor
Christina Lekati, psychologist, social engineering expert. To learn about her you may visit: https://www.cyber-risk-gmbh.com/About_Christina_Lekati.html
Course Synopsis:
Introduction
1. Who are the insider threats?
2. Motives of insider threats
3. Consequences
Insider Threat Activity
1. How do insider threats operate?
2. Types of insider threat activity
3. Who could be an insider threat? (colleagues, contractors, business partners)
Recognizing the signs
1. Suspicious activity
2. Suspicious comments
3. Explicit insider threat activity – Red Flags
4. Disgruntlement & unmet expectations
5. Behavioral precursors
Responding to suspicious activity
1. Best-practice responses
2. What you should not do
3. Reporting process
Recruitment efforts
1. Recruitment efforts from third parties, business partners, or other insiders
2. What will you be offered?
3. Consequences
4. Responding to a recruitment attempt
5. Reporting
Case Studies
Concluding Remarks
For more information, you may contact us.
Terms and conditions
You may visit: https://www.cyber-risk-gmbh.com/Terms.html
Cyber security is ofter boring for employees. We can make it exciting.