INSIDER THREAT DEFENSE  

 

 

SECURITY BEHIND THE FIREWALL IS OUR BUSINESS

 

 

 
   

 

Home

 


 

About Us

 


 

NCMS

Associate Member

 

 


 

Insider Threat Defense

Trademark Notice

TM Information

 


 

 

NISPOM Conforming Change 2 Training

Insider Threat Program Development

 


Welcome To Insider Threat Defense

  • Insider Threat Defense has become the "Leader-Go To Company" for Insider Threat Program Development Training for National Insider Threat Policy and NISPOM Conforming Change 2 .

  • Insider Threat Defense has provided our training and services to 500+ organizations; U.S. Government Agencies, Defense Industrial Base (DIB) contractors, NCMS Members / Chapters, Defense Security Service, Critical Infrastructure Providers, Aviation / Airline Security Professionals, large and small businesses. (Client Listing)

 

 

What Is The Difference Between Our Insider Threat Program Development Training And Insider Threat Training Offered By Other Companies-Organizations?

  • Insider Threat Defense offers our students and clients; Experience, Past Performance, Comprehensive Training, Commitment, Research, Collaboration, Awards.

  • Insider Threat Defense training and services go beyond National Insider Threat Policy & NISPOM Conforming Change 2 Requirements. (Compliance Does Not = Security)

  • Insider Threat Defense has successfully demonstrated to our students and clients the many insider threat risks that other training companies-organizations fail to address, and will put an organizations assets at risk.

  • Insider Threat Defense addresses Insider Threat Program Development Training / Management with a "Real World" approach using an Insider Threat Enterprise Risk Management 360 (ITERM360 ) methodology.

  • Insider Threat Defense training and services executes the "Insiders Playbook" of potential breach scenarios, to find holes in security defenses, before an Insider does.

 

 

NISPOM Conforming Change 2 Overview

  • NISPOM Conforming Change 2 was released on May 21, 2016.

  • DIB Contractors must have a written Insider Threat Program Plan in place to begin implementing an Insider Threat Program, no later then November 30, 2016.

 

 

Insider Threat Program Development Training For NISPOM Conforming Change 2 (Brochure)

 

Instructor Experience / Bio

 

 

Who Should Attend?

  • The Insider Threat Program Development Training Course is designed for individuals who are responsible for, or involved in; Insider Threat Program Development / Implementation / Management and Insider Threat Risk Mitigation. (Insider Threat Program Managers, Insider Threat Analysts, Insider Threat Support Personnel, Facilities Security Officers (FSO's), Chief Security Officers (CSO's), Human Resources-Personnel Security Specialists, Chief Information Officers (CIO’s), Information Technology (IT) / Network Administrators-Security Administrators, Chief Information Security Officers (CISO’s), Information Systems Security Managers / Officers (ISSM's-ISSO's), Information Assurance Managers (IAM's, IAO's), Contracting Officers and Legal / General Counsel)

 

 

Insider Threat Program Development Training -- Key Learning Objectives (2 Days)

Students Will Learn:

  • Insider Threat Terminology

  • How Damaging And Costly An Insider Threat Incident Can Incident Can Be (Various Examples, Case Studies)

  • The Behavioral Indicators Of Concern To An Insider Threat Program (Witting, Unwitting)

  • The Security Policies And Procedures Needed To Build A Foundation Of Security For The Protection Of The Organization Assets And Insider Threat Risk Mitigation

  • The Importance Of Gaining Buy-In From Senior Management And Defining The Scope Of An Insider Threat Program

  • The Essential Elements Needed For Successful Insider Threat Program Development And Insider Threat Risk Mitigation

  • How To Develop An Insider Threat Program Per NISPOM Conforming Change 2 Requirements And Achieve Compliance (DSS ISL-2016-02)

  • Why Going Beyond NISPOM Conforming Change 2 Requirements Is Essential For Successful Insider Threat Risk Mitigation

  • How To Create An Insider Threat Risk Management Framework / Insider Threat Program Hub / Working Group
    What Are The Essential Data Sources That Will Support An Insider Threat Program (Data Collection & Analysis, Technical, Non-Technical)

  • How To Develop An Insider Threat Program Policy And Implementation Plan (Templates Supplied)

  • The Importance Of Creating Insider Threat Program NDA's, Rules Of Behavior (Template Supplied)

  • How To Build Insider Threat Awareness Into The Workforce To Detect And Report Potential Insider Threats (Insider Threat Awareness DVD's Provided)

  • How To Detect Activity Indicative Of Insider Threat Behavior With User Activity Monitoring Tools

  • How To Handle Insider Threat Inquiries, Investigations & Case Management

  • The Technical / Non-Technical Threats That Can Be Utilized By Insiders For Malicious Purposes

  • How To Conduct Insider Threat Risk Assessment To Identify Vulnerabilities

 

 

What Does The Training Include?

Insider Threat Risk Assessment And Mitigation (ITRAM) Handbook
The ITRAM Handbook Provides: (140+ Pages)

  • Guidance for developing or enhancing an organization’s Insider Threat Program, and numerous checklists that provide an organization the ability to assess its vulnerability to Insider Threats.

  • The checklists in this handbook are a series of self-audit questions that point to the presence or absence of policies, procedures, training, safeguards, technologies or best practices that must be considered by Counterintelligence (CI), Security, Information Assurance (IA), Human Resources-Personnel Security and other management personnel as proactive measures to minimize the Insider Threat. These checklists will provide immediate steps, recommendation and best practices that can be taken to further mitigate any damages that could me caused by malicious Insiders.

 

 

Insider Threat Program Development Training Course Student DVD Toolkit

  • The DVD is filled with training materials, Insider Threat Program Policy templates, Insider Threat Program Support Personnel Non-Disclosure Agreement template, Insider Threat Program Information Sharing MOU-MOA template, Insider Threat Awareness and Education materials and other resources to help develop, implement and manage an Insider Threat Program.

 

 

Insider Threat Security Specialist (ITSS) Certificate
The ITSS Certificate will validate and provide confidence to employers and DSS that the ITSS;

  • Understands the minimum standards and guidance for implementation of an Insider Threat Program per NISPOM Conforming Change 2.

  • Has the knowledge, skills and resources to develop, implement and manage or support an Insider Threat Program.

  • Can effectively communicate with the many individuals that support an Insider Threat Program / Insider Threat Program Working Group.

  • Can conduct Insider Threat Risk Assessment to identify vulnerabilities, and provide actionable risk mitigation strategies to detect, deter and mitigate Insider Threats.

 

 

Insider Threat Program Development Training - Students Evaluations & Comments

  • The Insider Threat Program Development Training Course will meet and exceed the NISPOM Conforming Change 2 - Insider Threat Program requirements, providing you with the knowledge and resources to design and implement a robust Insider Threat Program.

  • Past students are rating the Insider Threat Program Development Training in the "Above Average" to "Excellent" Category. Student comments are stating that the training is one the most comprehensive, structured, holistic, resourceful and affordable courses available. (References Available Upon Request)
    Student Evaluations

 

 

Cost / Training Locations/ Registration

Insider Threat Defense for a LIMITED TIME is offering NCMS Members and Defense Industrial Base Contractors the Insider Threat Program Development Training at a special rate of $795.00 per person. The normal cost is $1,395. (Credit Card, Checks Accepted.)

 


 

Location

Columbia, Maryland

 

Dates
Monday, November 28, 2016 To Tuesday, November 29, 2016

Time
8:00AM To 5:00PM

Address
University of Maryland, Baltimore County (UMBC)
6996 Columbia Gateway Drive
Columbia, Maryland, 21046

 

Cost
$795 - 2 Day Class

REGISTRATION LINK FOR COLUMBIA, MD

 


 

Future Classes For 2016 - 2017

Additional classes are being planned for 2016 and 2017. Please check back for more details.

 

 


 

 

NCMS Chapters / Defense Industrial Base Contractors
Interested in having the Insider Threat Program Development Training taught to your NCMS Chapter, company or security group?

 

Interested in hosting an Insider Threat Program Development Training class for multiple companies? (Your Company Will Receive A Discount On The Training)

 

Please call to discuss further.

 


 

 

Insider Threat Risk Mitigation Services

Insider Threat Defense offers a full suite of services to help your organization combat the Insider Threat;

  • Insider Threat Program / Policy Development, Implementation & Management Guidance / Consulting

  • Insider Threat User Activity Monitoring-Behavioral Analytic Tools (Guidance / Implementation)

  • Insider Threat Risk Assessments - Penetration Testing / Gap Analysis / Mitigation Guidance

Insider Threat Defense Training / Risk Mitigation Services Overview

 

Insider Threat Risk Assessment Overview Brochure

 

Insider Threat Defenses Announces Agent Surefire Insider Threat Training-Simulation Game

 

 


 

 

Contact Information

Jim Henderson, CISSP, CCISO
CEO Insider Threat Defense, Inc.
Insider Threat Program Development Training Course Instructor
Cyber Security-Information System Security Program Management Training Course Instructor
Cyber Threat-Insider Threat Risk Mitigation Specialist / Analyst
Founder / Chairman Of The National Insider Threat Special Interest Group
Phone: 888-363-7241 / 561-809-6800
Websites / E-Mail Addresses
www.insiderthreatdefense.com
jimhenderson@insiderthreatdefense.com
www.nationalinsiderthreatsig.org
jimhenderson@nationalinsiderthreatsig.org

 

 

hits
counter

 


 
 

          

  Copyright © 2016- INSIDER THREAT DEFENSE - All Rights Reserved - Legal Notice