View important principles and tasks; about 5 -10 minutes. Please note, you will not receive a certificate of completion for watching these videos.

Critical Pathway Episode 4

The Critical Pathway. S2/E4: “Outcomes”
The Insider Threat Vigilance Video Series aids the workforce in identifying and reporting insider threat indicators. In this second season, an unexpected change breeds uncertainty. Which insider moved along the critical pathway to becoming a threat?

Critical Pathway Episode 3

The Critical Pathway. S2/E3: “See Something, Say Something”
The Insider Threat Vigilance Video Series aids the workforce in identifying and reporting insider threat indicators. In this second season, an unexpected change breeds uncertainty. Do Antonio and Rachel's coworkers report their behaviors?

Critical Pathway Episode 2

The Critical Pathway. S2/E2: “Indicators”
The Insider Threat Vigilance Video Series aids the workforce in identifying and reporting insider threat indicators. In this second season, an unexpected change breeds uncertainty. How do Antonio and Rachel feel about this uncertainty?

Critical Pathway Episode 1

The Critical Pathway. S2/E1: “Organizational Trust”
The Insider Threat Vigilance Video Series aids the workforce in identifying and reporting insider threat indicators. In this second season, an unexpected change breeds uncertainty. How does leadership handle the change?

Behavioral Indicators

Behavioral Indicators of an Active Shooter
A real-life example of an insider displaying concerning behavioral indicators. This individual would eventually carry out a grave act of kinetic violence.

Critical Pathway Episode 1

Insider Threat in Critical Infrastructure
Breakdowns in critical infrastructure can have devastating effects on national security and national public health and safety. An Insider's access can pose a unique threat to these sectors.

Vigilance Episode 4

Turning People Around, Not Turning Them In. S1/E4: “Meeting of the Minds”
The Insider Threat Vigilance Series aids the workforce in understanding how to identify and report insider threat indicators.

Vigilance Episode 3

Turning People Around, Not Turning Them In. S1/E3: “What’s Pre-Publication Review?”
The Insider Threat Vigilance Series aids the workforce in understanding how to identify and report insider threat indicators.

Vigilance Episode 2

Turning People Around, Not Turning Them In. S1/E2: “Check Out My New Ride”
The Insider Threat Vigilance Series aids the workforce in understanding how to identify and report insider threat indicators.

Vigilance Episode 1

Turning People Around, Not Turning Them In. S1/E1: “An odd encounter with Tim”
The Insider Threat Vigilance Series aids the workforce in understanding how to identify and report insider threat indicators.

Counterintelligence and Insider Threat Support to Security

Counterintelligence and Insider Threat Support to Security
Counterintelligence, Insider Threat, and Security work together to manage risk in support of national security. Learn how CI and Insider Threat can support your security program and discover resources for training and awareness at your organization.

Insider Threat for Senior Leaders

Insider Threat for Senior Leaders
Federal and DoD policies establish minimum standards for Insider Threat Programs in government agencies, DoD Components, and cleared industry. This video provides an executive-level summary of these requirements in under eight minutes.

Mishandling Classified Information

Insider Threat Micro-Learning Video Lesson: Mishandling Classified Information
Improper handling of classified documents can happen. Sometimes the mishandling is unwitting, but it can also be a potential risk indicator for Insider Threat. Knowing how to handle these situations is crucial to protecting our nation's secrets.

Counterintelligence and Insider Threat Support to Security

Insider Threat Micro-Learning Video Lesson: Mozaffar Khazaee
An Insider Threat uses authorized access to U.S. Government resources, including personnel, facilities, information, equipment, networks, or systems, to either wittingly or unwittingly harm national security. Anyone with authorized access to U.S. Government resources could become an insider threat.

Insider Threats to Cybersecurity video

Insider Threats to Cybersecurity
The internal cyber threat is different from other insider threat challenges faced by your organization and requires specific strategies to prevent and address them. Watch the video, then follow the links to test your knowledge, and learn more.