This course provides guidance to critical infrastructure employees and service providers on how to identify and take action against insider threats to critical infrastructure.
At the end of this course, the participants will be able to:
Describe the threat that malicious insiders pose to critical infrastructure.
Identify common characteristics and indicators associated with malicious insiders.
Identify actions that can be taken against insider threats.