Cybersecurity Leadership Certification

Proofpoint Certified Insider Threat Specialist

DLP Badge

Fridays on March 10th, 17th & 24th | 10-11 am PT | 1-2 pm ET

Remote work, cloud adoption, and employee turnover have created challenges for organizations trying to protect their most strategic and sensitive data. Over the past two years, insider-led incidents have increased by 44%.1 Insiders may be careless, malicious, or compromised. So how can you better manage insider threats to help your organization minimize brand and financial damage? 

Join our Certified Insider Threat Specialist program to learn common insider threat scenarios, effective approaches for detecting and managing these threats, and how to build a successful Insider Threat Management Program.     

Becoming certified is easy. Just register and attend the three 1-hour courses listed below, pass the exam at the end of each course, and earn your certification! 

1Ponemon Institute. “2022 Cost of Insider Threats Global Report.” 2022. 

*This track is intended for all levels of cybersecurity administration roles. These are NOT technical training sessions. For product or solution-specific education, please visit our web-based accreditation and instructor-led technical coursesAll courses are eligible for CPE credits through ISC(2).

Courses

Friday, March 10th

10 am PT | 1pm ET

Getting Started with Insider Threats

Friday, March 17th

10 am PT | 1 pm ET

Building a Successful Insider Threat Management Program - and Pitfalls to Avoid

Friday, March 24th

10 am PT | 1pm ET

A Day in the Life of an Insider Threat Analyst

Course 1

Getting Started with Insider Threats

Remote work, cloud adoption, and employee turnover are creating risks of data loss and insider threats. According to the 2022 Ponemon Cost of Insider Threat Report, insider-led incidents have increased 44% over the past two years, making it imperative for organizations to be aware of the potential for insider threats and have a strategy to address them.    

In this session, our instructors will provide a foundational overview of insider threats. Join us for the first course as we discuss: 

  • What are insider threats and how they differ from insider risk  
  • The three types of insider threats 
  • Key approaches to detecting and managing insider threats 
  • How Insider Threat Management (ITM) and DLP are converging 
  • The definition of an Insider Threat Management program 

Course 2

Building a Successful Insider Threat Management Program - and Pitfalls to Avoid

Insider Threat Management (ITM) takes a holistic focus on managing the risks that insiders pose to your organization’s assets, systems, and data. A successful ITM program goes beyond the Security team to include HR, Legal, and Compliance. All must work together toward a common goal: protecting data and decreasing risk to the business. A well-run ITM program must include people, process, and technology.  

Join us for the second course to learn: 

  • How to build an Insider Threat Management Program 
  • Approaches for balancing security and privacy 
  • Tools used to manage insider threats and required capabilities 
  • How to measure success 

Course 3

A Day in the Life of an Insider Threat Analyst

Insider threats are on the rise. However, not all threats are created equal. Insider use cases range from careless users to departing employees to credential theft – each requiring a different response. Security teams need to correlate alerts and manage investigations quickly and efficiently to minimize business damage – both within and outside of Security.

Join us for the third and last course to hear first-hand about the day in the life of an insider threat analyst from two Insider Threat Program Managers. You will learn about: 

  • Use cases - insider threat indicators, context, and common responses 
  • Benefits of proactive threat hunting 
  • Controls for escalation and oversight 
  • How to streamline investigations with HR, Legal, and Compliance 
  • Insider threat as part of the broader security ecosystem