Course
Insider Threat Program Development / Management - Insider Threat Detection & Data Analysis Training Course
This training will provide students with practical and cost effective strategies, and a Step By Step Blueprint to develop a comprehensive Insider Threat Mitigation (ITM) Framework that will support the ITP. The success of an ITP requires Key Stakeholder Commitments and Business Process Improvements. Any key stakeholder that supports the ITP will gain a much broader and deeper understanding of collaboration components required, and the many underlying and interconnected components that are essential for a comprehensive ITP / Investigations. This will ensure key stakeholders are Universally ITM training requires more than just attending a course, reviewing PowerPoint presentations and taking an exam. We provide our students with an ITP Management Toolkit. The toolkit provides students with a hardcopy ITP Management Handbook, and an abundance of educational resources, templates and checklists for ITP development, management and optimization.
Key Information