Mitigating insider threats

Course CYB108C

Description

This course will focus on applicable technical safeguards to insider threats, recognizing that is it not easy to secure completely. There are several technical safeguards to leverage: separation of duties Separation of dutiesA security principle stating that sensitive or critical responsibilities should be shared by multiple entities (e.g. staff or processes), rather than a single entity, to prevent a security breach. , personnel rotation, privilege and permission management, two-person integrity IntegrityThe ability to protect information from being modified or deleted unintentionally or when it’s not supposed to be. Integrity helps determine that information is what it claims to be. Integrity also applies to business processes, software application logic, hardware, and personnel. , complete mediation of activities, and monitoring and surveillance. The course will present how and why these controls can help to mitigate, detect, and investigate insider wrongdoing.

Objectives

  • Identify insider threats and the motivations behind them
  • Distinguish between types of insider threats
  • Describe tactics, techniques and procedures used in insider threats
  • Apply security controls and countermeasures to mitigate insider threat

Target audience

IT practitioners, IT decision makers, and other technical/security personnel interested in learning more about insider threats.

Prerequisites

Prior to attending, it would be beneficial for participants to take course CYB108C - Discovering Cyber Security Cyber securityThe protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information. More specifically, cyber security includes the body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, damage or unauthorized access so as to ensure confidentiality, integrity and availability. . It may also be beneficial to take course CYB201C - Cyber Security Foundations for GC Information Systems.

 

Date modified: