Cybersecurity Leadership Certification
Proofpoint Certified Insider Threat Specialist
Courses
Friday, March 10th 10 am PT | 1pm ET |
Getting Started with Insider Threats |
Friday, March 17th 10 am PT | 1 pm ET |
Building a Successful Insider Threat Management Program - and Pitfalls to Avoid |
Friday, March 24th 10 am PT | 1pm ET |
A Day in the Life of an Insider Threat Analyst |
Course 1
Getting Started with Insider Threats
Remote work, cloud adoption, and employee turnover are creating risks of data loss and insider threats. According to the 2022 Ponemon Cost of Insider Threat Report, insider-led incidents have increased 44% over the past two years, making it imperative for organizations to be aware of the potential for insider threats and have a strategy to address them.
In this session, our instructors will provide a foundational overview of insider threats. Join us for the first course as we discuss:
- What are insider threats and how they differ from insider risk
- The three types of insider threats
- Key approaches to detecting and managing insider threats
- How Insider Threat Management (ITM) and DLP are converging
- The definition of an Insider Threat Management program
Course 2
Building a Successful Insider Threat Management Program - and Pitfalls to Avoid
Insider Threat Management (ITM) takes a holistic focus on managing the risks that insiders pose to your organization’s assets, systems, and data. A successful ITM program goes beyond the Security team to include HR, Legal, and Compliance. All must work together toward a common goal: protecting data and decreasing risk to the business. A well-run ITM program must include people, process, and technology.
Join us for the second course to learn:
- How to build an Insider Threat Management Program
- Approaches for balancing security and privacy
- Tools used to manage insider threats and required capabilities
- How to measure success
Course 3
A Day in the Life of an Insider Threat Analyst
Insider threats are on the rise. However, not all threats are created equal. Insider use cases range from careless users to departing employees to credential theft – each requiring a different response. Security teams need to correlate alerts and manage investigations quickly and efficiently to minimize business damage – both within and outside of Security.
Join us for the third and last course to hear first-hand about the day in the life of an insider threat analyst from two Insider Threat Program Managers. You will learn about:
- Use cases - insider threat indicators, context, and common responses
- Benefits of proactive threat hunting
- Controls for escalation and oversight
- How to streamline investigations with HR, Legal, and Compliance
- Insider threat as part of the broader security ecosystem