Mitigating insider threats

Product code: SEC-0019

Overview

Delivery method

Delivery method

Virtual classroom

Duration

Duration

3.5 hours

Audience

Audience

All SSC employees at all levels

 

Description

This course will focus on applicable technical safeguards to insider threats, recognizing that is it not easy to secure completely. There are several technical safeguards to leverage: separation of duties, personnel rotation, privilege and permission management, two-person integrity, complete mediation of activities, as well as monitoring and surveillance. The course will present how and why these controls can help to detect, investigate and mitigate insider wrongdoing.

Learning Objectives

By the end of this course, you will be able to:

  • Identify insider threats and understand the motivations behind them;
  • Distinguish between different types of insider threats;
  • Describe tactics, techniques, and procedures used in insider threats;
  • Apply security controls and countermeasures to mitigate insider wrongdoing.

Target Audience

IT practitioners, IT decision makers, and other technical/security personnel interested in learning more about insider threats.

Prerequisite(s)

Prior to attending, it would be beneficial for participants to take course DDN235S - Discover Cyber Security. It may also be beneficial to take course CYB201C - Cyber Security Foundations for GC Information Systems.

No Current Offerings

Date modified: 2025-08-20

Have something to share?