Kickstarting Your Insider Threat Program
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
7 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Kickstarting Your Insider Threat Program to your Wishlist.

Add to Wishlist

Kickstarting Your Insider Threat Program

Get Compliant with Conforming Change 2 (CC2)
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
7 students enrolled
Created by Greg Cullison
Last updated 9/2016
English
Price: $200
30-Day Money-Back Guarantee
Includes:
  • 1.5 hours on-demand video
  • 3 Articles
  • 19 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Understand what is meant by the 'Insider Threat'
  • Learn NISPOM Conforming Change 2 requirements in detail so you can build your own compliant program
  • Discover how to identify and address potential Insider Threat indicators
  • Understand what insider threat means for your company, what is at risk, and what you can do to protect your assets
  • Interpret the new NISPOM requirements and identify exactly what your organization needs to do to achieve full compliance
  • Learn what the observable indicators of insider threat are, and how to train your employees to recognize and report them through the right channels
View Curriculum
Requirements
  • Users who have some understanding of the concept of insider threat will get the most out of this course
Description

The Insider Threat can affect any organization anywhere, whether through stolen information, corporate sabotage or fraud.  New U.S. Federal requirements under NISPOM Conforming Change 2 now compel cleared defense contractors to create and maintain a functioning Insider Threat Program.

Many companies are confused.  They don’t know where to start.  We believe every company deserves clarity so they can be compliant and build robust programs.  This online course, “Kickstarting Your Insider Threat Program,” is developed from Big Sky Associates’ widely acclaimed live seminars. The course is designed to provide you with the best practices you need to build an Insider Threat Program, whether you are a security manager, Facility Security Officer (FSO), Insider Threat Program Senior Official (ITPSO), or other company official.  The lessons will show you how to define the Insider Threat problem, clearly explain the NISPOM Conforming Change 2 (CC2) requirements, and show you how to uncover potential insider threat indicators.  

Big Sky’s subject matter experts have developed Insider Threat Programs for U.S. Defense and Security agencies as well as for private companies.


Who is the target audience?
  • Corporate Security Managers, Facility Security Officers (FSOs) and I​nsider Threat Program Senior Officials (ITPSOs) who are working to develop and/or implement an insider threat program that complies with NISPOM CC2
  • Security execs who may not be required to implement an insider threat program but are interested in learning best practices and leveraging existing frameworks and resources
Students Who Viewed This Course Also Viewed
Curriculum For This Course
14 Lectures
01:54:39
+
Introduction to the Course
2 Lectures 06:05
+
Insider Threat 101
2 Lectures 10:25

http://www.bigskyassociates.com/blog/how-does-nispom-conforming-change-2-define-insider-threat

Preview 00:00
+
Required Elements of an Insider Threat Program
5 Lectures 30:20
Conforming Change 2 - NISPOM Requirements 1-3
13:52

Conforming Change 2 - NISPOM Requirements 4-7
12:13

Snapshot Assessment
00:47

http://www.bigskyassociates.com/conforming-change-2-snapshot-assessment

Overview of Assessment
01:29

Starting an Insider Threat Program with Limited Resources
01:58
+
Insider Threat Indicators
4 Lectures 28:27
Insider Threat Indicators
08:36

Prioritize Your Efforts
03:12

Operate an Efficient and Sustainable Program
07:45

Key Organizational Stakeholders
08:54
+
Wrap Up
1 Lecture 02:25
You're Done!
02:25

Final Assessment
10 questions
About the Instructor
Greg Cullison
0.0 Average rating
0 Reviews
7 Students
1 Course
Security Process Improvement and Insider Threat Guru

Instructor Greg Cullison is COO at Big Sky Associates, a security process improvement company. He is also the Insider Threat subject lead at ThreatSwitch, a security management software company that helps organizations get and stay compliant with National Industrial Security Policy requirements. Greg has worked with numerous clients to improve their security operations and lectures frequently on the new Federal insider threat mandate. He has spent many years working on issues of national security. Greg holds degrees from Claremont McKenna College and Princeton University.