0

    Your Cart is Empty

    Insider Threat Training Manual

    Have Questions?
    Talk to a MorganHill Expert at 214-784-8232

    Document Name:Insider Threat Training Manual

    Overview:  Comprehensive handbook designed by MorganHill to educate employees, contractors, and personnel within an organization about the risks and challenges associated with insider threats.  

    We have over 100 + policies for ISO and dozens of specialty documents to choose from. 

    Training Modules:

    Training Module 1 - Introduction
    Training Module 2 - What is an Insider Threat?
    Training Module 3 - Who are the Actual “Insiders”?
    Training Module 4 - Types of Insider Threats (Unintentional)
    Training Module 5 - Types of Insider Threats (Intentional)
    Training Module 6 - Costs of Insider Threats
    Training Module 7 - How Does an Insider Threat Manifest Itself?
    Training Module 8 - How to Detect Insider Threats
    Training Module 9 - Threat Indicators
    Training Module 10 - Behavioral Indicators
    Training Module 11 - Personal Factors
    Training Module 12 - Organizational Factors
    Training Module 13 - How an Insider Threat Unfolds
    Training Module 14 - Assessing the Insider Threat
    Training Module 15 - Cleared Industry's Role for Combating Insider Threats
    Training Module 16 - Beware! Exploitation of Business Activities
    Training Module 17 - Beware! Exploitation of Global Supply Chain
    Training Module 18 - Beware! Personal Contact
    Training Module 19 - Beware! Foreign Visits
    Training Module 20 - Beware! Academic Solicitation
    Training Module 21 - Beware! Conferences, Conventions and Trade Shows
    Training Module 22 - What to Report - Reporting Requirements for Cleared Contractors
    Training Module 23 - What to Report - Mishandling of Classified Information
    Training Module 24 - What to Report - Misuse of Computer Systems
    Training Module 25 - What to Report - Suspicious Cyber Incidents
    Training Module 26 - What to Report - Foreign Influence
    Training Module 27 - What to Report - Suspicious Controls
    Training Module 28 - What to Report - Suspicious Financial Activity
    Training Module 29 - What to Report - Recording Devices
    Training Module 30 - More Examples of Insider Threats and Their Consequences
    Training Module 31 - Get Assistance
    Training Module 32 - You Can Make a Difference
    Training Module 33 - Key Points

    ISMS Section:Section 6 - People Controls

    Control Mapping: ISO/IEC 27001:2022 Annex A Controls and Control 6.3 - 27002: 2022

    Format: Microsoft Word

    Length: 39 pages.



    Companies Who Trust Us

    ACE Hardware Logo
    The YMCA Logo
    Keller Williams Logo
    BlueCross BlueShield Logo
    evision Logo
    University of Oklahoma Logo
    Lloyd's Logo
    Sigma Sense Logo
    JPay Logo
    State of Utah Seal
    Argo AI Logo