Insider Threat
Insider Threat Programs are designed to deter, detect, and mitigate actions by insiders who represent a threat to national security. If you are new to Insider Threat Program Management or Operations, we recommend you review the training products in the order listed below to develop a foundation in Insider Threat Program Management and Operations concepts and principles. After review of these training products, additional training is available on this webpage to expand your knowledge and skills.
- National Insider Threat Awareness Month (NITAM) 2020
- Insider Threat Awareness INT101.16
- Establishing an Insider Threat Program INT122.16
- Insider Threat Toolkit: Policy/Legal, Reporting, Establishing a Program, Cyber Insider Threat, and Vigilance Tabs
Common and shared understanding of counter-insider threat functional tasks, and the knowledge and skills associated with the competencies required to perform those tasks.
Select groups of related courses that highlight special areas of studies
Internet-based, self-paced training courses
- Insider Threat Awareness Course INT101.16
- Establishing an Insider Threat Program for Your Organization INT122.16
- Developing a Multidisciplinary Insider Threat Capability INT201.16
- Insider Threat Mitigation Responses INT210.16
- Preserving Investigative and Operational Viability in Insider Threat INT220.16
- Insider Threat Records Checks INT230.16
- Insider Threat Basic HUB Operations INT240.16
- Critical Thinking for Insider Threat Analysts INT250.16
- Insider Threat Privacy and Civil Liberties INT260.16
- Maximizing Organizational Trust INT270.16
- Cyber Insider Threat INT280.16
- Behavioral Science in Insider Threat INT290.16
- Continuous Monitoring Course CS200.16
- Counterintelligence Concerns for National Security Adjudicators CI020.16
- Unauthorized Disclosure (UD) of Classified Information and Controlled Unclassified Information (CUI) IF130.16
Security products designed to provide guidance and information to perform specific tasks
- Establishing Prevention, Assistance, and Response (PAR) Capabilities
- Tales from the Inside: Volume 4
- Tales from the Inside: Volume 3
- 2020 Insider Threat Vigilance Calendar
- Critical Thinking Techniques for Insider Threat Analyst
- DOD
Component Insider Threat Training Requirements and Resources
- Foreign
Intelligence Entity Targeting Recruitment Methodology
- Human Resources and Insider Threat Programs
- Insider Risk Programs for the Healthcare and Public Health Sectors
- Insider Threat Essential Body of Knowledge - Deskside Reference
- Insider Threat Program Kinetic Violence Self-Assessment: Lessons Learned from School Safety
- Tales from the Inside: Volume 2
- Behavioral Science and Insider Threat
- Insider Threat Reporting Procedures
- Insider Threat Programs for the Critical Manufacturing Sector—Implementation Guide
- Insider Threat Resources for Industry Senior Officials
- Privacy and Civil Liberties Case Law Examples
- The Principles of Confidentiality
- Freedom of Information Act (FOIA) Exemptions
- Privacy Act Consent Rule Exceptions
- Workplace Environment and Organizational Justice
- Critical Thinking Tools for Insider Threat Analyst
- 2020 Insider Threat Annual Vigilance Campaign
- Insider Threat Virtual Forum Guidance
- Customizable DOD Command Brief for Insider Threat Awareness
- Insider Threat Definitions
- Insider Threat Indicators in User Activity Monitoring
- Insider Threat Program (ITP) for Industry
- Insider Threat Vigilance Campaign Guidance
- Potential Risk Indicators Kinetic Violence
- Potential Risk Indicators: Insider Threat
- Sample
Insider Threat Program Plan
- Tales from the Inside: Volume 1
- The Critical Pathway - Facilitated Discussion Guide
- Turning People Around, Not Turning Them In - Facilitated Discussion Guide
- Understanding
Espionage and National Security Crimes
- Vigilance Campaign Materials
- What's the 411 on 811
- Whistleblower Protection Policies and FAQs
- Why Threats of Violence Are Not Protected
Quick and easy ways to test your knowledge and encourage security awareness at your organization
Posters available to download and promote security awareness in the workplace
Training videos, usually in 10 minutes or less, that allows you to refresh your knowledge of a critical topic or quickly access information needed to complete a job
Five-ten minute videos that provide information and demonstrate various security procedures
- Resilience Animation
- Turning People Around, Not Turning Them In.
- The Critical Pathway
- Social Media Mining by Insider Threats
- CI and Insider Threat Support to Security
- Cultural Awareness in the Workplace
- Espionage Target - You
- Insider Threat in Critical Infrastructure
- Insider Threat: Resilience
- Insider Threat for Senior Leaders Video
- Insider Threat Video Lesson: Behavioral Indicators of an Active Shooter
- Insider Threat Video Lesson: Cybersecurity
- Insider Threat Video Lesson: Mishandling Classified Information
- Insider Threat Video Lesson: Mozaffar Khazaee
- Military Virtual Cultural Awareness Training (VCAT)
- National Insider Threat Awareness Month Brief
- Unauthorized Disclosure Video Lesson: DNI Testimony
Repositories of role-based resources that serve as one-stop shops for security essentials
Online, informative events available live, on-demand, or previously recorded that address topics and issues of interest to defense security personnel
- 2020 Insider Threat Virtual Security Conference Recordings
- Adverse Information Reporting
- Applied Research on Exfiltration and Security
- Applied Research on Mental Health Conditions and Security
- Applied Research on Social Media and Security
- Cyber Insider Threat
- Defense Insider Threat Management and Analysis Center Update
- DOD Unauthorized Disclosure Program Manager
- Human Resources and Insider Threat
- Industry and Insider Threat
- Insider Threat and Equal Employment Opportunity
- Insider Threat and the DOD CAF
- Insider Threat for DOD Security Professionals
- Kicking off an Insider Threat Vigilance Campaign
- Maximizing Organizational Trust
- PERSEREC, the Threat Lab
- Personal Resilience and Insider Threat: Hardening the Target
- Privacy and Civil Liberties in Insider Threat
- The Psychology of Spies: Off-Ramping Insider From the Critical Pathway to Insider Attacks
- Security Chat with Dr. Millick
- Security Chat with Dr. Robert Gallagher
- Security Chat with Mr. Dixon on Inside Threat Programs: Engaging Management and Supervisors
- Security Chat with Ms. Cahill, Chief, DOD Insider Threat Enterprise Program Management Office
- Supervisor Reporting and Security with PERSEREC
- UAM in Insider Threat Programs
- Virtual Insider Threat Symposium for Industry
- Venn of Counterespionage Webinar