Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Insider Threat Vulnerability Assessor Training

This 3-day course develops the skills and competencies necessary to perform an insider threat vulnerability assessment of an organization.

This training is based upon the research of the CERT Insider Threat Center of the Software Engineering Institute. The CERT Insider Threat Center has been researching the insider threat problem since 2001 in partnership with the Department of Defense, the Department of Homeland Security, the U.S. Secret Service, other federal agencies, the intelligence community, private industry, academia, and the vendor community.

The Insider Threat Vulnerability Assessment helps organizations to

  • identify issues impacting their insider threat risk
  • design and implement tactical countermeasures
  • formulate a strategic action plan for long-term risk mitigation

The organizational vulnerabilities and corresponding processes for detection and response that are assessed are based on actual cases and CERT's research into appropriate mitigations.

Course participants will learn how to plan and execute an assessment including developing the final evaluation report.

Please note that successful completion of this course is a required component of the Insider Threat Vulnerability Assessor (ITVA) Certificate. To learn more about the certificate and package pricing for the courses, please go to: http://cert.org/insiderthreat

Who should attend?

  • Those interested in the CERT methodology and tools to perform insider threat vulnerability assessments within their organization or in other organizations.

*Please note that in order to perform assessments using CERT tools, candidate assessors must be sponsored by an approved SEI Partner organization. For more information on the process and associated fees, please refer to SEI Certification Opportunities.

Topics

The course covers topics such as:

  • ITVA assessment methodology lifecycle: Planning, Pre-Assessment, On-site, and Post-Assessment / Reporting
  • ITVA workbook components: capabilities, levels of preparedness, indicators, evidence, and scoring
  • Capability areas: Data Owners, Human Resources, Legal, Physical Security, Information Technology, Software Engineering, and Trusted Business Partners
  • ITVA workbooks including
    • types: (there are seven workbooks corresponding to the seven capability areas)
    • structure
    • use
  • Preparing and planning for the assessment
  • Knowledge, skills, and abilities required to perform the assessment
  • Building a multi-disciplinary assessment team
  • Pre-assessment activities including
    • completion of pre-assessment spreadsheet by the assessed organization
    • determining logistics
    • reviewing organizational documentation
    • developing a data collection plan
  • Using Pre-assessment tools and templates
  • Performing on-site data collection (interviews and observations)
  • Substantiating and corroborating evidence for meeting indicators
  • Recording and scoring data in the Joint Assessment Tool (JAT)
  • Developing the assessment report
  • Completing the assessment
  • Overview of ITVA capabilities and indicators for each area / workbook

Objectives

At the completion of the course, learners will be able to:

  • Describe the phases of the ITVA assessment process
  • Distinguish between capabilities, levels, and indicators
  • Scope assessment for particular critical assets or business processes
  • Identify logistics that must be determined for an assessment
  • Plan and schedule an assessment
  • Develop a data collection plan
  • Review assessed organization's submitted documentation to determine applicability as evidence and map to related capabilities and indicators
  • Observe execution or demonstration of activities during on-site to substantiate indicator performance
  • Interview assessed organization's staff to corroborate performance of indicators
  • Enter evidence into the Joint Assessment Tool (JAT)
  • Substantiate evidence of indicators being met
  • Score capabilities based on indicator verification
  • Record substantiation of indicators and scores for capabilities in the JAT
  • Outline the main sections of the assessment report
  • Write sections of the assessment report
  • Defend results presented in the assessment report

Prerequisites

Participants completing the Insider Threat Vulnerability Assessor Training Certificate must take the prerequisite courses: Insider Threat Overview: Preventing, Detecting, and Responding to Insider Threats and Building an Insider Threat Program before taking this course.

Students are strongly recommended to also take the Insider Threat Program Manager: Implementation and Operation course to provide additional background knowledge for the course, but this is not required.

Materials

Course methods include lecture, group exercises, and scenario completion. Participants will receive a course notebook, case studies and a downloadable copy of the course materials.

Schedule

This 3 day course meets at the following times:
Days 1-3, 9:00 a.m. - 5:00 p.m.



Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials.

Course Details

Course Fees [USD]

U.S. Industry: $2650

U.S. Government/Academic: $2250

International: $3150

Please select a course offering then click REGISTER.
 

Dates

 
This course may be offered by special arrangement at customer sites.

For More Information

E-mail: course-info@sei.cmu.edu
Phone: 412-268-7622