WORKSHOP INTRODUCTION

Many of us do not realise that the insider threat is more prevalent today than ever before. Yet we do not protect ourselves from insider threat especially Corporates. Today battle is not about stealing physical assets or money for that matter, it’s all about INFORMATION.

Protecting information is the key to reducing the insider threat and many are unaware of it and like majority of the folks we do not know what to protect in the FIRST PLACE and how to protect it.

WORKSHOP OBJECTIVES

  • Learn and understand the Myths and Truths about insider threat
  • Learn the Red flags for insider threat
  • Development of Prevention and Detective Strategies to combat insider threat

KEY TAKEAWAYS

  • Bring your own device policy
  • Information security policy
  • Methodology for Data Classification
  • Framework for managing when a data breach and insider threat
  • 1 Encrypted hard-drive

PROGRAM OUTLINE

  • Understanding of key concepts in the world of Insider Threat
  • Deliberation of framework and strategies in the space of Insider Threat
  • Prevention and Detection controls to combat Insider Threat

COURSE INFORMATION

Date: On demand
Venue: To be advised
Duration: 3 Days
Time: 9am to 5pm (9 hours including 1 hour lunch break and 2 tea-breaks of 20 minutes. 30 minutes Questions and Answers and 30 minutes for Competency Assessment - Optional)
Fees: Singapore Dollars 2499 (before GST) per participant
10% discount for 2 or more participants from the same the Company
20% discount for 4 or more participants from the same the Company

TOP