Skip Navigation LinksASIS International / Education & Events / Education Programs / Classroom / Developing and Implementing an Insider Threat Program

Developing and Implementing an Insider Threat Program

What are CPE credits?
up to
14
CPE Credits
20 - 21 July 2015
The Hotel Monaco
Alexandria, VA, UNITED STATES

REGISTRATION FOR THIS EVENT IS FULL

This comprehensive program is designed to develop the critical components of an Insider Threat Program using modern analytic techniques and measures.  Using a Security Return on Investment (ROI) approach, learn how to evolve your current security program into a converged management structure that will identify and deter individuals posing both violent and non-violent threats.  Learn the skills and procedures required to identify social-psychological factors critical to shaping a comprehensive insider threat program. Real case studies are used to explain how counterproductive work behavior can reveal early signs of a potential insider threat. The program will examine Potential Risk Indicators and how organizations can best be structured to detect and deter the insider threat.

This event has reached its full capacity. Please contact us at 1+703.519.6200 and ask to speak with an Education Programs staff member about waiting list options.

Registration Fees

 Read Our Brochure

 Pertinent Information

 Who Should Attend

  • Chief Security Officers (CSOs)
  • Chief Information Security Officers (CISOs)
  • Directors of Corporate Security
  • Chief Info Officers (CIOs)
  • Chief Risk Officers (CROs)
  • Chief Compliance Officers (CCOs)

 Immediate Benefits

  • Understand the basic requirements for developing, coordinating, and continuously evaluating an integrated insider threat program.
  • Learn the methodologies used to recruit insiders and individual motivators
  • Recognize the utility of different operational structures and collaborative standards in combating the insider threat.
  • Examine behavioral risk indicators and identify organizational and situational triggers for the violent and non-violent insider threat.
  • Review the laws, regulations, civil liberties, and privacy policies applicable to the insider threat.
  • Learn techniques for internal alerting, reporting, collecting, storing, and evaluating data relevant to insider threat indicators.
  • Learn the psychometric approach to building metrics; how to analyze existing measures; and how to re-purpose existing metrics from across the organization for your needs.

 Program Overview

Developing an Operational Strategic Plan

Developing a state of the art security program requires an understanding of your existing program’s strengths and weaknesses and comparing the existing program against the desired goals required to modernize and provide a Return on Investment (ROI) to senior management.  The plan should consider multiple areas of possible improvement.

Analytics

Learn about current trends in behavior modeling from a security perspective.  Use the models of both non-violent and violent behaviors as the core elements in designing internal security mitigation strategies to: Identify, Prevent; Detect; and Respond to the Insider Threat within the organization. 

Metrics

Learn and practice the hidden skill of developing and analyzing security metrics.  Learn about the principles and guidelines used for presenting meaningful metrics as an integral aspect of presentations to senior management.

Monitoring and Risk Management/Mitigation

Discover techniques and practices of designing effective security monitoring systems.  Apply the metric based implementation of the behavioral model through the integration of human and technical monitoring technologies, processes and protocols to achieve a comprehensive security program.

Effectively Collaborating to Build and Maintain an Insider Threat Program

Security programs are not effective in isolation. Discover how to identify and work with both internal and external groups to develop a converged approach to protect your organization from the threat.  Knowing who to engage and how is essential for an effective program.


Communicating with the C-Suite and gaining buy-in for an Insider Threat Program

Senior management supports security programs only if they can prove their value to the organization.  Use the knowledge and skills provided in this workshop coupled with your ability to develop effective and meaningful presentations that demonstrate a ROI in security.

Counterintelligence Essentials

Is there a difference between Security and Counterintelligence?  Learn about the way security professionals can and should enhance their skills in industry by applying Counterintelligence principles. 

Insider Threat Incident Response

Once an employee has been identified as a potential or real threat to the organization, mitigation becomes critical.  Learn about both human and technical options available to the security professional.  Discover that early intervention is essential in providing effective ROI.

Insider Threat Education and Training

An effective program relies on effective education and awareness.  Learn about who should be taught, what they need to learn and what type of media is most effective for each audience.  Discover that simple changes of perspectives in understanding the motivations concerning the potential Insider can create dramatic improvements in the efficiency of an organization.

 Hours, Fees, & Hotels

Registration Hours

Monday
7:00 am – 8:00 am

Tuesday
7:00 am – 8:00 am

Program Hours

Monday
8:00 am – 5:00 pm

Tuesday
8:00 am – 3:00 pm

Registration Fees

Fees include daily continental breakfast, refreshment breaks, and a networking reception. Hotel costs are not included.

Until May 22 After May 22
Member $825 $925
Nonmember $1,125 $1,225

Hotel

Be sure to mention ASIS when requesting the special room rate of $139 single/double (plus tax). This price will be honored until the room block is full or May 15.

Hotel Monaco Alexandria
480 King Street
Alexandria, VA 22314
Reservations: 800/368-5047
Direct: 202/939-6430
Website

 Discounts

Team Discount

Receive a 10% discount when three to five attendees register from the same organization, 15% for six or more. Email asis@asisonline.org for details.

Certification Discount

ASIS members and nonmembers holding the distinction of CPP, PCI, and PSP receive a $25 discount per classroom program. This discount is automatically applied at checkout.

 Faculty

Mr Daniel A McGarvey, Sr
  • Mr Daniel A McGarvey, Sr
  • Sr. Principal Business Process Analyst
  • Alion Science & Technology
  • Alexandria VA, UNITED STATES
  • Colleagues: 0
Session: Analytics and Monitoring
Session: Course Conclusion
Session: Efffectively Collaborating to Build and Maintain an Insider Threat Program
Session: Integrating an Insider Threat Program with Enterprise Security Risk Management
Session: Counterintelligence Essentials
Session: Insider Threat Incident Response
Session: Developiong an Operational Strategic Plan
Session: Insider Threat Education and Traning
Session: Exercise
Session: Communicating with the C-Suite and Gaining Buy-in For an Insider Threat Program (Metrics)

Bio: Daniel McGarvey is the Director for Security Programs with Global Skills Exchange. He has over 30 years of in-depth experience managing and directing national and international programs requiring sensitive compartmented information and special access in government and industry. A Retired member of the Intelligence Senior Executive Service, his former assignments include being Director of Information Protection for the USAF, developing international space security agreements for the NRO and supporting the Presidential Commission on Joint Security (JSC II) through the NSC. He is a member of both the Defense and Intelligence Council and CSO Round Table.