Course Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
36 minutes
Difficulty
Intermediate
CEU/CPE
1
Video Transcription
00:04
Yeah,
00:06
yeah,
00:10
No matter what guide you use building an effective insider threat program with all the associative processes, work flows, playbooks, tools and everything else is both an art
00:24
and a science
00:25
for this course. We leaned into the art part of that equation, and our experts identified some key power ups to accelerate the implementation and success of your own insider threat program.
00:38
If you already have a program, we're confident these tips will help you take your program to the next level.
00:46
So to summarize,
00:55
use scenario based configurations
00:58
by digging deeper into every facet of the story. You can identify insider threat risk attributes and start mapping out the policy process and technology needs of your program.
01:10
Take a phased approach when building or growing your program,
01:14
trying to build a comprehensive insider threat program all at once. Maybe a recipe for failure.
01:19
With a phased approach, you can deploy and learn in a way that doesn't overwhelm and help prevent costly missteps and do it in a way that suits your circumstances and goals.
01:30
If you take a human centric approach to responsible mediation, you can prepare for success by understanding how these cases will be different than other cyber risks because human behavior is the most unpredictable variable to account for.
01:46
Because audits could be another use case for your program, don't shy away from audit topics in an insider threat program. Embrace them.
01:53
Leverage your insider threat program when auditing.
01:57
Ultimately, if you're insider Threat program can provide answers toe audit questions.
02:01
It provides validity for both the audits and the insider threat program.
02:07
Build continuous improvement into your program.
02:09
Visibility and analytics on insider threat events can help drive big changes to your organization.
02:15
Your insider threat program should become a true business partner by contributing valuable insights to your organization.
02:24
These insights have all come from the collective experience of our code 42 experts who have spent years consulting with and running insider threat programs. Armed with these additional tips, you can accelerate the implementation and success of your own insider threat program.
02:44
Thanks for watching
5 Power-Ups for Your Insider Threat Program

With all the advice on how to build an Insider Threat Program or ITP, it is easy to miss some crucial details. Industry leader Code42 presents five power-ups that will ensure your ITP is successful and meaningful for your organization.

Instructed By