Insider Threat Malicious Insider Discussion
I’m working on a political science discussion question and need a sample draft to help me understand better.
- Read ’17 Examples of Real Insider Threats’ and select one threat to discuss for this weeks post. Include any potential strategies which could be utilized to spot, assess and mitigate the threat you selected.
- https://www.tessian.com/blog/insider-threats-types-and-real-world-examples/
Course Syllabus:
This course examines the concepts, methods, and practices associated with risk management and threat assessment from an all-hazard perspective. Students will learn how to conduct hazard and risk analysis for both the public and private sectors. This course will include identifying and profiling hazards, analyzing and assessing hazard risk, developing tactics to manage risk, examining a multiple of risk assessment tools, and communicating risk to the public. Participants will examine critical infrastructure sectors and associated interdependencies, cascading consequences, and shared vulnerabilities. Students will perform their own risk analysis and develop recommendations for policy makers as part of this curriculum.