Have Questions?
Talk to a MorganHill Expert at 214-784-8232
Document Name:Insider Threat Training Manual
Overview: Comprehensive handbook designed by MorganHill to educate employees, contractors, and personnel within an organization about the risks and challenges associated with insider threats.
We have over 100 + policies for ISO and dozens of specialty documents to choose from.
Training Modules:
Training Module 1 - Introduction
Training Module 2 - What is an Insider Threat?
Training Module 3 - Who are the Actual “Insiders”?
Training Module 4 - Types of Insider Threats (Unintentional)
Training Module 5 - Types of Insider Threats (Intentional)
Training Module 6 - Costs of Insider Threats
Training Module 7 - How Does an Insider Threat Manifest Itself?
Training Module 8 - How to Detect Insider Threats
Training Module 9 - Threat Indicators
Training Module 10 - Behavioral Indicators
Training Module 11 - Personal Factors
Training Module 12 - Organizational Factors
Training Module 13 - How an Insider Threat Unfolds
Training Module 14 - Assessing the Insider Threat
Training Module 15 - Cleared Industry's Role for Combating Insider Threats
Training Module 16 - Beware! Exploitation of Business Activities
Training Module 17 - Beware! Exploitation of Global Supply Chain
Training Module 18 - Beware! Personal Contact
Training Module 19 - Beware! Foreign Visits
Training Module 20 - Beware! Academic Solicitation
Training Module 21 - Beware! Conferences, Conventions and Trade Shows
Training Module 22 - What to Report - Reporting Requirements for Cleared Contractors
Training Module 23 - What to Report - Mishandling of Classified Information
Training Module 24 - What to Report - Misuse of Computer Systems
Training Module 25 - What to Report - Suspicious Cyber Incidents
Training Module 26 - What to Report - Foreign Influence
Training Module 27 - What to Report - Suspicious Controls
Training Module 28 - What to Report - Suspicious Financial Activity
Training Module 29 - What to Report - Recording Devices
Training Module 30 - More Examples of Insider Threats and Their Consequences
Training Module 31 - Get Assistance
Training Module 32 - You Can Make a Difference
Training Module 33 - Key Points
ISMS Section:Section 6 - People Controls
Control Mapping: ISO/IEC 27001:2022 Annex A Controls and Control 6.3 - 27002: 2022
Format: Microsoft Word
Length: 39 pages.