Course details

The Insider Threat can affect any organization anywhere, whether through stolen information, corporate sabotage or fraud.  New U.S. Federal requirements under NISPOM Conforming Change 2 now compel cleared defense contractors to create and maintain a functioning Insider Threat Program.

Many companies are confused.  They don't know where to start.  We believe every company deserves clarity so they can be compliant and build robust programs.  This online course, "Kickstarting Your Insider Threat Program," is developed from Big Sky Associates' widely acclaimed live seminars. The course is designed to provide you with the best practices you need to build an Insider Threat Program, whether you are a security manager, Facility Security Officer (FSO), Insider Threat Program Senior Official (ITPSO), or other company official.  The lessons will show you how to define the Insider Threat problem, clearly explain the NISPOM Conforming Change 2 (CC2) requirements, and show you how to uncover potential insider threat indicators.  

Big Sky's subject matter experts have developed Insider Threat Programs for U.S. Defense and Security agencies as well as for private companies.


Updated on 19 August, 2016
Courses you can instantly connect with... Do an online course on General Business starting now. See all courses

Rate this page