The Insider Threat can affect any organization anywhere, whether through stolen information, corporate sabotage or fraud. New U.S. Federal requirements under NISPOM Conforming Change 2 now compel cleared defense contractors to create and maintain a functioning Insider Threat Program.
Many companies are confused. They don’t know where to start. We believe every company deserves clarity so they can be compliant and build robust programs. This online course, “Kickstarting Your Insider Threat Program,” is developed from Big Sky Associates’ widely acclaimed live seminars. The course is designed to provide you with the best practices you need to build an Insider Threat Program, whether you are a security manager, Facility Security Officer (FSO), Insider Threat Program Senior Official (ITPSO), or other company official. The lessons will show you how to define the Insider Threat problem, clearly explain the NISPOM Conforming Change 2 (CC2) requirements, and show you how to uncover potential insider threat indicators.
Big Sky’s subject matter experts have developed Insider Threat Programs for U.S. Defense and Security agencies as well as for private companies.
Instructor Greg Cullison is COO at Big Sky Associates, a security process improvement company. He is also the Insider Threat subject lead at ThreatSwitch, a security management software company that helps organizations get and stay compliant with National Industrial Security Policy requirements. Greg has worked with numerous clients to improve their security operations and lectures frequently on the new Federal insider threat mandate. He has spent many years working on issues of national security. Greg holds degrees from Claremont McKenna College and Princeton University.