Description: Comprehensive insider threat training manual that includes training materials on all current and relevant insider threat subject matter as required by AT-2(2) within NIST SP 800-53, Revision 5.
Training Module 1 -Introduction Training Module 2 -What is an Insider Threat? Training Module 3 -Who are the Actual “Insiders”? Training Module 4 -Types of Insider Threats (Unintentional) Training Module 5 -Types of Insider Threats (Intentional) Training Module 6 -Costs of Insider Threats Training Module 7 -How Does an Insider Threat Manifest Itself? Training Module 8 -How to Detect Insider Threats Training Module 9 -Threat Indicators Training Module 10 -Behavioral Indicators Training Module 11 -Personal Factors Training Module 12 -Organizational Factors Training Module 13 -How an Insider Threat Unfolds Training Module 14 -Assessing the Insider Threat Training Module 15 - Your Role for Combating Insider Threats Training Module 16 -Beware! Exploitation of Business Activities Training Module 17 -Beware! Exploitation of Global Supply Chain Training Module 18 -Beware! Personal Contact Training Module 19 -Beware! Foreign Visits Training Module 20 -Beware! Academic Solicitation Training Module 21 - Beware! Conferences, Conventions and Trade Shows Training Module 22 - What to Report -Reporting Requirements for Cleared Contractors Training Module 23 - What to Report -Mishandling of Classified Information Training Module 24 -What to Report - Misuse of Computer Systems Training Module 25 -What to Report - Suspicious Cyber Incidents Training Module 26 -What to Report - Foreign Influence Training Module 27 -What to Report - Suspicious Controls Training Module 28 -What to Report - Suspicious Financial Activity Training Module 29 -What to Report - Recording Devices Training Module 30 -More Examples of Insider Threats and Their Consequences Training Module 31 -Get Assistance Training Module 32 -You Can Make a Difference Training Module 33 -Key Points
Specifications:Developed in accordance with NIST SP 800-53, Revision 5 (12-10-2020), and other related security control frameworks, where applicable.
Control Family: Awareness and Training (AT).
Security Control Baseline Coverage:Includes coverage for all LOW, MOD, and HIGH Baselines, per NIST SP 800-53B (12-10-2020).
Direct Compliance Use:FISMA, FedRAMP, NISP eMASS RMF, and other related NIST RMF reporting requirements for security and privacy. Can be used for mapping to DFARS NIST 800-171 and CMMC controls, where applicable.