Summary of 124 - Mitigating Insider Threats

Course Description

This course will focus on applicable technical safeguards to insider threats, recognizing that is it not easy to secure completely. There are several technical safeguards to leverage: separation of duties, personnel rotation, privilege and permission management, two-person integrity, complete mediation of activities, and monitoring and surveillance. The course will present how and why these controls can help to mitigate, detect, and investigate insider wrongdoing.

Course Objectives

  • Identify insider threats and the motivations behind them
  • Distinguish between types of insider threats
  • Describe tactics, techniques and procedures used in insider threats
  • Apply security controls and countermeasures to mitigate insider threat

Target Audience

IT practitioners, IT decision makers, and other technical/security personnel interested in learning more about insider threats.




½ day

Pre- requisite(s)


Report a problem on this page
Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, please contact us.

Date modified: