Curriculum > Cyber Awareness >

Insider Threats


Source: Ponemon Cost of Insider Threats Global Report 2022


Tutorial Content

At a Glance

  • Access Controls
  • Intentional/Unintentional Threats
  • 2 Case Studies

As one of the more complex threat vectors discussed, in this tutorial we looks at some of the more common indicators associated with this notoriously challenging area of information security. Covering motivations, tactics, notable cases, and methods of identification, defending against insider threats requires both awareness and vigilances.

“Regardless of whether these threats are malicious or unintentional, it is important for you as a member of your organisation to be on the lookout … and to report possible insider threats if you identify them.”

- Hut Six, Insider Threats

Learning Objectives

  • Understanding Common Motives
  • Identification Methods
  • Threat Reporting
  • Completion time: ~ 10 minutes

Tags

Related