
Building an Insider Threat Program in 90 days

About
Successfully mitigating insider threats requires more than just awareness or the use of the latest technology. It demands a structured and executable plan.
This three-and-a-half-day, classroom-based course equips participants with a comprehensive 90-day roadmap for designing, implementing, and operationalising an insider threat program tailored to their organisation’s needs.
By the end of the course, participants will have a step-by-step action plan that they can immediately execute to build a robust and sustainable insider threat program.
This course uses real-world case studies, industry best practices, and practical exercises to ensure attendees leave with clear strategies, defined milestones, and actionable tools to drive insider threat readiness and resilience within their organisation.
Objectives
- Tailored Insider Threat Strategy. Identify your organisation’s specific risks and develop a customised 90-day execution plan that aligns with your business objectives.
- A practical, Hands-On Approach. Through real-world exercises and case studies, you will learn to apply the industry’s best practices to your organisation immediately.
- Clear Roadmap for Execution. Walk away with a structured, step-by-step action plan to build and implement an insider threat program, ready for execution as soon as you return to your organisation.
- Expert-Led Training. Learn from industry-leading insider threat professionals with extensive experience in risk mitigation, governance, and program implementation.
- Governance and Compliance Readiness. Understand how to align your insider threat program with governance structures, security policies, and compliance requirements.
- Immediate Actionable Insights. Create a plan that outlines key milestones, resource allocation, and measurable success indicators for monitoring program effectiveness.
- This course ensures that you don’t just learn about insider threats. You leave with a fully developed, organisation-specific plan you can execute immediately.
Topics Covered
This three-and-a-half-day practical course offers participants a systematic method for creating a customised insider threat program for their organisation.
By combining risk identification, best practice analysis, and hands-on exercises, attendees will depart with a clear and actionable 90-day plan to reduce insider threats.
- Day 1: Understanding Insider Threat Risks & Organisational Readiness
- Day 2: Insider Threat Best Practices & Practical Exercises
- Day 3: Building the 90-Day Execution Plan
- Day 4: Finalising Insider Threat Roadmap and Special Guest Session
Benefits
By the end of this course, participants will be able to:
- Identify their organisation’s specific insider threat risks by analysing vulnerabilities, potential threat actors, and critical assets that need protection.
- Understand governance structures, policies, compliance requirements, and resource considerations for building a sustainable insider threat program.
- Examine and utilise some of the industry’s best practices for mitigating insider threats that best set your organisation’s needs.
- Engage in hands-on exercises to reinforce best practices and develop a tailored approach to insider threat detection and response.
- Develop a customised 90-day execution plan that aligns with your organisation’s risk profile, integrating practical mitigation strategies with governance, policies, and operational workflows.
- You will leave with a fully developed roadmap that provides a structured, actionable strategy for launching an effective and scalable insider threat program.
This course ensures that every participant walks away with a tailored, organisation-specific plan to implement to strengthen their insider threat defences immediately.
Who Should Attend
This course is perfect for professionals tasked with developing, managing, or enhancing insider threat programs, including:
- Security leaders (CISOs, security managers, risk officers)
- HR and legal professionals involved in insider risk management
- IT and cybersecurity teams implementing technical controls
- Compliance and governance officers
- Law enforcement or counterintelligence personnel
Prerequisite
Completion of the "Insider Threat Foundation" course is required. This ensures all participants have a foundational understanding of insider threat concepts before moving into the program development phase.
Course Length
Duration: Three-and-half Days
Format: Classroom-based, instructor-led training
Location: On-site or designated training facility