8 Steps to Building a Modern Insider Threat Program

Cybrary
Course

Are you a security manager, architect, or analyst looking to establish a cutting-edge Insider Threat Program (ITP)? Insider risk specialists, Code42, team up with security experts to share 8 steps for building a modern ITP. Learn how to better protect your organization’s data, as well as implement detection and response technology.

Time
1 hour 25 minutes
Difficulty
Intermediate
CEU/CPE
1
5.0
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course Description

From key concepts like insider triggers to the importance of workflows, here is how you can protect your organization from the inside out.

Instructed By
Alex Matheson
Alex Matheson
Instructor
Provider
Code42

Code42 Insider Threat Software delivers a faster, simpler, more comprehensive path to data loss detection, investigation and response.

Provider
Cybrary
Course Components
On Demand Videos to learn from industry leaders
Assessments to gauge understanding and comprehension
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a 8 Steps to Building a Modern Insider Threat Program Certificate of Completion