Cybersecurity Leadership Certification

Proofpoint Certified Insider Threat Specialist


Friday, March 10th

10 am PT | 1pm ET

Getting Started with Insider Threats

Friday, March 17th

10 am PT | 1 pm ET

Building a Successful Insider Threat Management Program - and Pitfalls to Avoid

Friday, March 24th

10 am PT | 1pm ET

A Day in the Life of an Insider Threat Analyst

Course 1

Getting Started with Insider Threats

Remote work, cloud adoption, and employee turnover are creating risks of data loss and insider threats. According to the 2022 Ponemon Cost of Insider Threat Report, insider-led incidents have increased 44% over the past two years, making it imperative for organizations to be aware of the potential for insider threats and have a strategy to address them.    

In this session, our instructors will provide a foundational overview of insider threats. Join us for the first course as we discuss: 

  • What are insider threats and how they differ from insider risk  
  • The three types of insider threats 
  • Key approaches to detecting and managing insider threats 
  • How Insider Threat Management (ITM) and DLP are converging 
  • The definition of an Insider Threat Management program 

Course 2

Building a Successful Insider Threat Management Program - and Pitfalls to Avoid

Insider Threat Management (ITM) takes a holistic focus on managing the risks that insiders pose to your organization’s assets, systems, and data. A successful ITM program goes beyond the Security team to include HR, Legal, and Compliance. All must work together toward a common goal: protecting data and decreasing risk to the business. A well-run ITM program must include people, process, and technology.  

Join us for the second course to learn: 

  • How to build an Insider Threat Management Program 
  • Approaches for balancing security and privacy 
  • Tools used to manage insider threats and required capabilities 
  • How to measure success 

Course 3

A Day in the Life of an Insider Threat Analyst

Insider threats are on the rise. However, not all threats are created equal. Insider use cases range from careless users to departing employees to credential theft – each requiring a different response. Security teams need to correlate alerts and manage investigations quickly and efficiently to minimize business damage – both within and outside of Security.

Join us for the third and last course to hear first-hand about the day in the life of an insider threat analyst from two Insider Threat Program Managers. You will learn about: 

  • Use cases - insider threat indicators, context, and common responses 
  • Benefits of proactive threat hunting 
  • Controls for escalation and oversight 
  • How to streamline investigations with HR, Legal, and Compliance 
  • Insider threat as part of the broader security ecosystem