Skip Navigation LinksASIS International / Education & Events / Education Programs / Classroom / Developing and Implementing an Insider Threat Program

Developing and Implementing an Insider Threat Program

What are CPE credits?
up to
14
CPE Credits
13 - 14 July 2016
The Brown Palace
Denver, CO, UNITED STATES
 
What behaviors indicate a potential insider threat?
 
Insider Threat BR 2016cover_thumb.jpg

An insider threat arises when anyone with access to information or assets an organization values uses that access to inflict harm to the organization, its employees, or to national security. Failing to indentify and mitigate the threat can have devastating consequences for your organization and increase its vulnerability to violent activity or economic espionage. It is important for you to be aware of key indicators and the value a comprehensive "behaviorally focused" insider threat program has in protecting your organization and the country.

This comprehensive program is designed to develop the critical components of an insider threat program using modern analytic techniques and measures. Using a security return on investment (ROI) approach, learn how to evolve your current security program into a united management structure that will identify and deter individuals from carrying out violent and non-violent threats.

Learn the skills and procedures required to identify social-psychological factors critical to shaping a comprehensive insider threat program. Real case studies are used to explain how counterproductive work behavior can reveal early signs of a potential insider threat.

Registration Fees

 Immediate Benefits

  • Understand the basic requirements for developing, coordinating, and continuously evaluating an integrated insider threat program.
  • Learn the methods used to create insiders and individual motivators.
  • Recognize the value of different operational structures and collaborative standards in combating the insider threat.
  • Examine behavioral risk indicators and identify organizational and situational triggers for the violent and non-violent insider threat.
  • Review the laws, regulation, civil liberties, and privacy policies applicable to the insider threat.
  • Learn techniques for internal alerting, reporting, collecting, storing, and evaluating data relevant to insider threat indicators.
  • Learn the psychometric approach to building and analyzing existing metrics to fit your needs across the organization.

 Who Should Attend

  • Chief security officers
  • Chief information security officers
  • Chief financial officers
  • Directors of corporate security
  • Chief risk officers
  • Chief compliance officers

 Program Overview

Developing an Operational Strategic Plan
Developing a state of the art security program requires an understanding of your existing program's strengths and weaknesses. Compare your existing program against the desired goals required to modernize and provide a return on investment (ROI) to senior management.

Analytics
Learn about the current trends in behavior modeling from a security perspective. Use the models of both nonviolent and violent behaviors as the core elements in designing internal security mitigation strategies to identify, prevent, detect, and respond to the insider threat within the organization.

Metrics
Learn and practice the hidden skill of developing and analyzing security metrics. Learn about the principles and guidelines used for presenting meaningful metrics as an integral aspect of presentations to senior management.

Monitoring and Risk Management/Mitigation
Discover techniques and practices of designing effective security monitoring systems. Apply the metric based implementation of the behavioral model through the integration of human and technical monitoring technologies, processes, and protocols to achieve a comprehensive security program.

Effectively Collaborating to Build and Maintain an Insider Threat Program
Security programs are not effective in isolation. Discover how to identify and work with both internal and external groups to develop a converged approach to protect your organization from the threat. Knowing who to engage and how is essential for an effective program.

Communicating with the C-Suite and Gaining Buy-in for an Insider Threat Program
Senior management supports security programs only if they can prove their value to the organization. Use the knowledge and skills provided in this workshop, coupled with your ability to develop effective and meaningful presentations, to demonstrate ROI in security.

Counterintelligence Essentials
Is there a difference between security and counterintelligence? Learn about the way security professionals can and should enhance their skills in the industry by applying counterintelligence priciples.

Insider Threat Incident Response
Once an employee has been identified as a real threat to the organization, mitigation becomes critical. Learn about both human and technical options available to the security professional. Discover that early intervention is essential in providing effective ROI.

Insider Threat Education and Training
An effective program relies on effective education and awareness. Learn about who should be taught, what they need to learn, and what type of media is most effective for each audience. Discover that simple changes of perspectives in understanding the motivations concerning the potential insider can create dramatic improvements in the efficiency of an organization.

 

 

 

 Hours, Fees, & Hotels

Hotel deadline extended to Friday, June 24.

Registration Hours

Wednesday-Thursday

7:00–8:00 am

Program Hours
 
Wednesday
8:00 am–5:00 pm
 
Thursday
 8:00 am-3:00 pm
 
Registration Fees
Fees include daily continental breakfast, refreshment breaks, and a networking reception.
Hotel costs are not included.
Fees 
 
Early-bird
5/14
After
5/14
Member
$   825
$  925
Nonmember
$1,125
$1,225


 

Hotel
Be sure to mention ASIS when requesting the special room rate of $189 single/double (plus tax). It will be honored until the room block is full or June 21, 2016.

The Brown Palace Hotel & Spa
321 17th Street
Denver, CO  80202
+1.800.321.2599
+1.303.297.3111

 Discounts

Team Discount:
Receive a 10% discount when three to five attendees register from the same organization, 15% for six or more. Email asis@asisonline.org for details.

Certification Discount:
ASIS members and nonmembers holding the distinction of CPP, PCI, and PSP receive a $25 discount per classroom program. This discount is automatically applied at checkout.

 Faculty

Mr Daniel A McGarvey, Sr
  • Mr Daniel A McGarvey, Sr
  • Sr. Principal Business Process Analyst
  • Alion Science & Technology
  • Alexandria VA, UNITED STATES
  • Colleagues: 0

Bio: Daniel McGarvey is the Director for Security Programs with Global Skills Exchange. He has over 30 years of in-depth experience managing and directing national and international programs requiring sensitive compartmented information and special access in government and industry. A Retired member of the Intelligence Senior Executive Service, his former assignments include being Director of Information Protection for the USAF, developing international space security agreements for the NRO and supporting the Presidential Commission on Joint Security (JSC II) through the NSC. He is a member of both the Defense and Intelligence Council and CSO Round Table.