Workshops & Training
Solutions.
INISIDER RISK ANALYST TRAINING.
Our online and certified insider risk analyst training is tailored for established and aspiring analysts. The training is 6 hours long and is designed in three modular building blocks that each focus on specific aspects of insider risk management as well as training analysts in triaging information, cultivating knowledge about different methods and dealing with various data sources to address insider risk holistically. The training comes with two assignments with personalised feedback.
How We Can Help.
This insider risk analyst training is developed to provide professional and academic insights to the participants. Thus, by the end of this training, you will be able to:
-
- Understand the insider risk activity spectrum and early signs of threats.
- Recognise analytical methods and data sources most helpful for insider risk management.
- Gain insights into the case management process.
Looking for something for the entire organisation?
Check out our Introduction to Insider Risk E-Learning
More InformationRequest More Information.
Trusted By
Our Workshops and Training have been trusted by leading organisations, now empowered to enhance their insider risk management efforts.
Content Overview.
Three building blocks with several objectives to build an advanced understanding of Insider Risk.
Building
Block 1.
Provides background on insider risk and its threat environment, the psychology of an insider and what an insider risk programme actually looks like. It focuses on creating an urgency for an insider risk programme, implementing it holistically, and understanding the psychological components of insider risk
Building
Block 2.
Focuses on introducing policy, privacy and ethical concerns while looking at what data sources are central to insider risk management. Here, we also explore different models of data analysis and consider what biases are relevant to insider risk management and their impact on analsysts.
Building
Block 3.
Takes a deeper dive into responding to an insider incident and recovering from it. Focusing on organisational setup, and case and incident management processes, it concludes with the delicate undertaking of recovery mechanisms.