View important principles and tasks; about 5 -10 minutes. Please note, you will not receive a certificate of completion for watching these videos.

Vigilance Episode 3

“What’s Pre-Publication Review?,” Season One: Turning People Around, Not Turning Them In.
The Insider Threat Vigilance Series aids the workforce in understanding how to identify and report insider threat indicators.

Vigilance Episode 2

“Check Out My New Ride,” Season One: Turning People Around, Not Turning Them In.
The Insider Threat Vigilance Series aids the workforce in understanding how to identify and report insider threat indicators.

Vigilance Episode 1

“An odd encounter with Tim,” Season One: Turning People Around, Not Turning Them In.
The Insider Threat Vigilance Series aids the workforce in understanding how to identify and report insider threat indicators.

Counterintelligence and Insider Threat Support to Security

Counterintelligence and Insider Threat Support to Security
Counterintelligence, Insider Threat, and Security work together to manage risk in support of national security. Learn how CI and Insider Threat can support your security program and discover resources for training and awareness at your organization.

Insider Threat for Senior Leaders

Insider Threat for Senior Leaders
Federal and DoD policies establish minimum standards for Insider Threat Programs in government agencies, DoD Components, and cleared industry. This video provides an executive-level summary of these requirements in under eight minutes.

Mishandling Classified Information

Insider Threat Micro-Learning Video Lesson: Mishandling Classified Information
Improper handling of classified documents can happen. Sometimes the mishandling is unwitting, but it can also be a potential risk indicator for Insider Threat. Knowing how to handle these situations is crucial to protecting our nation's secrets.

Counterintelligence and Insider Threat Support to Security

Insider Threat Micro-Learning Video Lesson: Mozaffar Khazaee
An Insider Threat uses authorized access to U.S. Government resources, including personnel, facilities, information, equipment, networks, or systems, to either wittingly or unwittingly harm national security. Anyone with authorized access to U.S. Government resources could become an insider threat.

Insider Threats to Cybersecurity video

Insider Threats to Cybersecurity
The internal cyber threat is different from other insider threat challenges faced by your organization and requires specific strategies to prevent and address them. Watch the video, then follow the links to test your knowledge, and learn more.