Data Protection Short: Insider Threats


Overview/Description
Target Audience
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

The prevalence of cybersecurity threats is on the rise, and a concerning number of them result from deliberately malicious behaviors of employees within organizations. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice.



Target Audience
All employees

Expected Duration (hours)
0.1

Lesson Objectives

Data Protection Short: Insider Threats

  • distinguish between least privilege and separation of duties as a means of controlling insider threats
  • Knowledge Check: Insider Threats
  • Course Number:
    lchr_01_c85_lc_enus

    Expertise Level
    Everyone