This paper from Carnegie Mellon discusses potential ways an insider threat program could go wrong. This toolkit contains resources to help you perform your role in the insider threat field. This webpage provided by CISA will help individuals, organizations, and communities create or improve an existing insider threat mitigation program. This guide provides direction for implementing the basic building blocks of an insider threat program. This Framework is designed to help optimize insider threat program capabilities.
This security training from the HHS is an example of requirements and guidance to provide appropriate role-based security training. The purpose of this example procedure from the EPA is to help with implementing the security control requirements for the Awareness and Training (AT) control family. This NIST Special Publication provides guidance for building an effective security program. Proofpoint Security Awareness Training is offering a free Phishing Awareness Kit. This kit gives you the tools you need to engage your users and turn them into a strong line of defense against phishing attacks and other cyber threats. This SANS whitepaper describes how to successfully implement a comprehensive Security Training, Awareness, and Education program. This document is an example of an Acceptable Use for System Administrators Policy from the University of Arizona.
Collection of cyber training courses and training aids provided by the DoD Cyber Exchange. It provides an overview of cybersecurity threats and best practices to keep information and information systems secure. KnowBe4 is a large security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. This resource provides general awareness and role-based information security training documents.
This link to CDSE provides insider threat training and awareness. This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 1. This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 2. This course from FEMA provides guidance on how to identify and take action against insider threats. The purpose of this publication is to provide procedures for assessing the CUI requirements in NIST Special Publication 800-171. This course from DNI is intended to help familiarize you with the subject of insider threat and to provide guidance. This course discusses how Insider Threat Awareness is an essential component of a comprehensive security program.
This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 1. This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 2. KnowBe4 is a large security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. The purpose of this publication is to provide procedures for assessing the CUI requirements in NIST Special Publication 800-171. This course introduces the threats and vulnerabilities faced when working within the government or defense industrial systems. The NICCS Education and Training Catalog is a central location where cybersecurity professionals across the nation can find over 3,000 cybersecurity-related courses. This resource provides general awareness and role-based information security training documents.