- NY Credits : 1.0
- TX Credits : 1.0
It is of critical importance for an entity to examine how an inside threat could harm an organization, both in the short term and extending into the future. Who in the entity has access to sensitive data that, if exposed or lost, could significantly disrupt or harm the organization's healthy operations? The potential population of insiders who may threaten the viability of a business can be quite extensive. In this course, we will examine history to identify the different types of insider threats to an organization.
Upon successful completion of Insider Threats - What Every Business Organization Should Know and Do, the user should be able to:
identify insider threats that have included executives, contractors, third-parties, fraud and white-collar crime,
recognize the growth of cyber commerce and cyber-related insider threats, intellectual property theft, corporate espionage and identity theft, and
identify best practices to prevent and monitor insider threats with people, processes, and technology solutions.