Mitigating insider threats
Overview
Delivery method
Virtual classroom
Duration
3.5 hours
Audience
All SSC employees at all levels
Description
This course will focus on applicable technical safeguards to insider threats, recognizing that is it not easy to secure completely. There are several technical safeguards to leverage: separation of duties, personnel rotation, privilege and permission management, two-person integrity, complete mediation of activities, as well as monitoring and surveillance. The course will present how and why these controls can help to detect, investigate and mitigate insider wrongdoing.
Learning Objectives
By the end of this course, you will be able to:
- Identify insider threats and understand the motivations behind them;
- Distinguish between different types of insider threats;
- Describe tactics, techniques, and procedures used in insider threats;
- Apply security controls and countermeasures to mitigate insider wrongdoing.
Target Audience
IT practitioners, IT decision makers, and other technical/security personnel interested in learning more about insider threats.
Prerequisite(s)
Prior to attending, it would be beneficial for participants to take course DDN235S - Discover Cyber Security. It may also be beneficial to take course CYB201C - Cyber Security Foundations for GC Information Systems.