Cybersecurity Leadership Certification
Proofpoint Certified Insider Threat Specialist
Fridays on March 10th, 17th & 24th | 10-11 am PT | 1-2 pm ET
Remote work, cloud adoption, and employee turnover have created challenges for organizations trying to protect their most strategic and sensitive data. Over the past two years, insider-led incidents have increased by 44%.1 Insiders may be careless, malicious, or compromised. So how can you better manage insider threats to help your organization minimize brand and financial damage?
Join our Certified Insider Threat Specialist program to learn common insider threat scenarios, effective approaches for detecting and managing these threats, and how to build a successful Insider Threat Management Program.
Becoming certified is easy. Just register and attend the three 1-hour courses listed below, pass the exam at the end of each course, and earn your certification!
1Ponemon Institute. “2022 Cost of Insider Threats Global Report.” 2022.
*This track is intended for all levels of cybersecurity administration roles. These are NOT technical training sessions. For product or solution-specific education, please visit our web-based accreditation and instructor-led technical courses. All courses are eligible for CPE credits through ISC(2).
Friday, March 10th
10 am PT | 1pm ET
|Getting Started with Insider Threats|
Friday, March 17th
10 am PT | 1 pm ET
|Building a Successful Insider Threat Management Program - and Pitfalls to Avoid|
Friday, March 24th
10 am PT | 1pm ET
|A Day in the Life of an Insider Threat Analyst|
Getting Started with Insider Threats
Remote work, cloud adoption, and employee turnover are creating risks of data loss and insider threats. According to the 2022 Ponemon Cost of Insider Threat Report, insider-led incidents have increased 44% over the past two years, making it imperative for organizations to be aware of the potential for insider threats and have a strategy to address them.
In this session, our instructors will provide a foundational overview of insider threats. Join us for the first course as we discuss:
- What are insider threats and how they differ from insider risk
- The three types of insider threats
- Key approaches to detecting and managing insider threats
- How Insider Threat Management (ITM) and DLP are converging
- The definition of an Insider Threat Management program
Building a Successful Insider Threat Management Program - and Pitfalls to Avoid
Insider Threat Management (ITM) takes a holistic focus on managing the risks that insiders pose to your organization’s assets, systems, and data. A successful ITM program goes beyond the Security team to include HR, Legal, and Compliance. All must work together toward a common goal: protecting data and decreasing risk to the business. A well-run ITM program must include people, process, and technology.
Join us for the second course to learn:
- How to build an Insider Threat Management Program
- Approaches for balancing security and privacy
- Tools used to manage insider threats and required capabilities
- How to measure success
A Day in the Life of an Insider Threat Analyst
Insider threats are on the rise. However, not all threats are created equal. Insider use cases range from careless users to departing employees to credential theft – each requiring a different response. Security teams need to correlate alerts and manage investigations quickly and efficiently to minimize business damage – both within and outside of Security.
Join us for the third and last course to hear first-hand about the day in the life of an insider threat analyst from two Insider Threat Program Managers. You will learn about:
- Use cases - insider threat indicators, context, and common responses
- Benefits of proactive threat hunting
- Controls for escalation and oversight
- How to streamline investigations with HR, Legal, and Compliance
- Insider threat as part of the broader security ecosystem