Data Protection Short: Insider Threats


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number


Overview/Description
The prevalence of cybersecurity threats is on the rise, and a concerning number of them result from deliberately malicious behaviors of employees within organizations. This course covers the dangers of insider threats, and key controls that organizations can use to help prevent them. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice.

Target Audience
All employees

Prerequisites
None

Expected Duration (hours)
0.1

Lesson Objectives

Data Protection Short: Insider Threats

  • distinguish between least privilege and separation of duties as a means of controlling insider threats
  • Course Number:
    lchr_01_c85_lc_enus