Course Introduction: How Can I Improve an ITP?

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
36 minutes
Difficulty
Intermediate
CEU/CPE
1
Video Transcription
00:06
Yeah,
00:10
Recognizing the growing risk posed by insider threats and committing to building a dedicated insider threat program is the beginning of, ah, challenging journey.
00:21
And there's no shortage of step by step guides on how to do this.
00:26
A quick Google search for build an insider threat program brings up over 10 million results.
00:34
Some guides do it in five steps.
00:36
Others 19,
00:38
the best ones we've seen have eight.
00:42
Regardless, no matter how many steps you use, building an effective insider threat program with all the associated processes, work flows, playbooks, tools and everything else
00:56
is both an art
00:58
and science.
00:59
For this course, we're going to lean into the art part of that equation.
01:03
Drawing from our experts riel world experiences ranging from small tech startups all the way up to global Fortune 500 companies, they found that there are some nuances in insider threat programs that may seem minor but can have a significant impact
01:22
on the success or failure of the program.
01:25
So with that in mind, we're going to look at some things that are simultaneously broadly applicable
01:30
but also actionable in making your program a success.
01:36
These are
01:38
using scenario based configurations
01:41
employing a phased approach to program maturity.
01:45
The need for human intervention and response.
01:49
Leveraging the insider threat program as an auditor
01:53
and finally planning for continuous improvement.
01:57
As you look through all the step by step guides out there, remember, there's no one size fits all template for the perfect program.
02:07
As you start building out or maturing your insider threat program, focus on the unique opportunities and challenges in your organization and incorporate those that seem best suited to your security goals and company culture.
02:23
Now, if you're looking to better prepare for success or simply level up where your current insider threat program is today,
02:31
let's get started.
Up Next