Extending trust to employees and contractors to access and make use of sensitive information, intelligence and materials is a necessary risk for nearly every organization and institution, whether public or private sector.
While many layers of security and barriers of protection -- personal screening, physical, infrastructure, access control, etc. -- are put in place, still malicious actors can and do slip through.
This course provides the foundation for understanding what/who insider threats are, as well as similar actors with similar agendas, the different types of assets that fall into their scope of interest, the damage they can do, and notable case studies.
The last section outlines current practices and advances in deterrence and prevention.
Event Dates
–
Eastern
Location
Online
Date Created: February 3, 2021