Insider Threat Awareness
- 6 topics | 30m
- Up to 30 languages
- Transcripts
Government agencies face a dual threat to their security - that from outsiders trying to access data and systems, and from insiders - employees, contractors, or partners - who misuse, whether intentionally or not, their authorized access. Insiders represent a substantial threat because they have knowledge and access to systems, allowing them to bypass security measures through legitimate means. This makes them difficult to detect. To manage potential insider threats, government agencies and departments must establish a security framework that protects, detects, and responds to insider risks to systems, assets, and data. This course introduces essential concepts related to insider threats, focusing on employees' role in protecting their agency's sensitive data and systems. The course provides an overview of common characteristics and indicators associated with malicious insiders and effective ways to respond if you suspect someone inside your agency poses a threat.This course was developed with subject matter support provided by Baker, Donelson, Bearman, Caldwell & Berkowitz, PC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice.
WHAT YOU WILL LEARN
-
describe what is meant by the term insider threat
-
recognize types of insider threats
-
identify indicators of a potential insider threat
-
report a potential insider threat appropriately
-
follow practices that help protect classified or sensitive government information from potential misuse by an insider threat
-
detect and respond appropriately to potential insider threats to sensitive or classified government information and systems
IN THIS COURSE
-
Insider Threat Awareness2m
-
The Insider Threat7m
-
Indicators of an Insider Threat5m
-
Reporting Potential Insider Threats2m
-
Protecting Sensitive or Classified Information2m
-
Knowledge Check: Insider Threat Awareness8m
YOU MIGHT ALSO LIKE
COMPLIANCE-COURSE
The No FEAR Act
COMPLIANCE-COURSE
EEO and Preventing Discrimination in the Federal Workplace
COMPLIANCE-COURSE
Hatch Act Overview