0

Your Cart is Empty

Insider Threat Training Manual

Have Questions?
Talk to a MorganHill Expert at 214-784-8232

Document Name:Insider Threat Training Manual

Overview:  Comprehensive handbook designed by MorganHill to educate employees, contractors, and personnel within an organization about the risks and challenges associated with insider threats.  

We have over 100 + policies for ISO and dozens of specialty documents to choose from. 

Training Modules:

Training Module 1 - Introduction
Training Module 2 - What is an Insider Threat?
Training Module 3 - Who are the Actual “Insiders”?
Training Module 4 - Types of Insider Threats (Unintentional)
Training Module 5 - Types of Insider Threats (Intentional)
Training Module 6 - Costs of Insider Threats
Training Module 7 - How Does an Insider Threat Manifest Itself?
Training Module 8 - How to Detect Insider Threats
Training Module 9 - Threat Indicators
Training Module 10 - Behavioral Indicators
Training Module 11 - Personal Factors
Training Module 12 - Organizational Factors
Training Module 13 - How an Insider Threat Unfolds
Training Module 14 - Assessing the Insider Threat
Training Module 15 - Cleared Industry's Role for Combating Insider Threats
Training Module 16 - Beware! Exploitation of Business Activities
Training Module 17 - Beware! Exploitation of Global Supply Chain
Training Module 18 - Beware! Personal Contact
Training Module 19 - Beware! Foreign Visits
Training Module 20 - Beware! Academic Solicitation
Training Module 21 - Beware! Conferences, Conventions and Trade Shows
Training Module 22 - What to Report - Reporting Requirements for Cleared Contractors
Training Module 23 - What to Report - Mishandling of Classified Information
Training Module 24 - What to Report - Misuse of Computer Systems
Training Module 25 - What to Report - Suspicious Cyber Incidents
Training Module 26 - What to Report - Foreign Influence
Training Module 27 - What to Report - Suspicious Controls
Training Module 28 - What to Report - Suspicious Financial Activity
Training Module 29 - What to Report - Recording Devices
Training Module 30 - More Examples of Insider Threats and Their Consequences
Training Module 31 - Get Assistance
Training Module 32 - You Can Make a Difference
Training Module 33 - Key Points

ISMS Section:Section 6 - People Controls

Control Mapping: ISO/IEC 27001:2022 Annex A Controls and Control 6.3 - 27002: 2022

Format: Microsoft Word

Length: 39 pages.



Companies Who Trust Us

ACE Hardware Logo
The YMCA Logo
Keller Williams Logo
BlueCross BlueShield Logo
evision Logo
University of Oklahoma Logo
Lloyd's Logo
Sigma Sense Logo
JPay Logo
State of Utah Seal
Argo AI Logo