Lessons

  • Overview
  • Lesson 1: The Problem of Insider Threats
  • Lesson 2: The Path to Insider Threat Detection
  • Lesson 3: A Multilayered Approach in Action
  • Knowledge Check
  • Post-Course Survey

Please sign up for the course to view lesson content

Malicious and unintentional insider threats are among the greatest risks to government information security. They can also be the most difficult cyberthreat to identify, given the many methods and motivations for execution, as well as the variety of indicators of risk. That’s why it’s critical for agencies to adopt a multilayered approach to insider threat detection and prevention.

In three lessons, this course examines the problem of insider threats in government. It explains how to align your insider threat analysis with your Federal Enterprise Architecture and explores a better, multilayered defense for agencies. In our last lesson, we offer examples of a multilayered approach in action.

This course was informed by Sean Applegate, Chief Technology Officer at Swish.

Thank you to Swish and Riverbed for this public sector resource.