You just enrolled in a GovLoop Academy course!
If you already have an account with GovLoop Academy, just sign in with your username and password to get started.
If you don’t already have an account, don’t worry. We created one for you!
Check your inbox for an email from us that will contain the information you need to confirm and set the password for your new account.
Need more help? Email us at [email protected] and we’ll gladly lend a hand.
Malicious and unintentional insider threats are among the greatest risks to government information security. They can also be the most difficult cyberthreat to identify, given the many methods and motivations for execution, as well as the variety of indicators of risk. That’s why it’s critical for agencies to adopt a multilayered approach to insider threat detection and prevention.
In three lessons, this course examines the problem of insider threats in government. It explains how to align your insider threat analysis with your Federal Enterprise Architecture and explores a better, multilayered defense for agencies. In our last lesson, we offer examples of a multilayered approach in action.
This course was informed by Sean Applegate, Chief Technology Officer at Swish.
Thank you to Swish and Riverbed for this public sector resource.