
Insider Threat Training Manual - DoD & Cleared Contractors (AT-2(2))
Description: Comprehensive insider threat training manual that includes training materials on all current and relevant insider threat subject matter as required by AT-2(2) within NIST SP 800-53, Revision 5. Also includes information from DCSA for cleared industry and other related DoD requirements from various publications within the broader Defense Industrial Base (DIB). Training Modules: Training Module 1 - IntroductionTraining Module 2 - What is an Insider Threat?Training Module 3 - Who are the Actual “Insiders”?Training Module 4 - Types of Insider Threats (Unintentional)Training Module 5 - Types of Insider Threats (Intentional)Training Module 6 - Costs of Insider ThreatsTraining Module 7 - How Does an Insider Threat Manifest Itself?Training Module 8 - How to Detect Insider ThreatsTraining Module 9 - Threat IndicatorsTraining Module 10 - Behavioral IndicatorsTraining Module 11 - Personal FactorsTraining Module 12 - Organizational FactorsTraining Module 13 - How an Insider Threat UnfoldsTraining Module 14 - Assessing the Insider ThreatTraining Module 15 - Cleared Industry's Role for Combating Insider ThreatsTraining Module 16 - Beware! Exploitation of Business ActivitiesTraining Module 17 - Beware! Exploitation of Global Supply ChainTraining Module 18 - Beware! Personal ContactTraining Module 19 - Beware! Foreign VisitsTraining Module 20 - Beware! Academic SolicitationTraining Module 21 - Beware! Conferences, Conventions and Trade ShowsTraining Module 22 - What to Report - Reporting Requirements for Cleared ContractorsTraining Module 23 - What to Report - Mishandling of Classified InformationTraining Module 24 - What to Report - Misuse of Computer SystemsTraining Module 25 - What to Report - Suspicious Cyber IncidentsTraining Module 26 - What to Report - Foreign InfluenceTraining Module 27 - What to Report - Suspicious ControlsTraining Module 28 - What to Report - Suspicious Financial ActivityTraining Module 29 - What to Report - Recording DevicesTraining Module 30 - More Examples of Insider Threats and Their ConsequencesTraining Module 31 - Get AssistanceTraining Module 32 - You Can Make a DifferenceTraining Module 33 - Key Points Specifications: Developed in accordance with NIST SP 800-53, Revision 5 (12-10-2020), and other related security control frameworks, where applicable. Control Family: Awareness and Training (AT). Control Mapping: AT-2(2). Security Control Baseline Coverage: Includes coverage for all LOW, MOD, and HIGH Baselines, per NIST SP 800-53B (12-10-2020). Direct Compliance Use: FISMA, FedRAMP, NISP eMASS RMF, and other related NIST RMF reporting requirements for security and privacy. Can be used for mapping to DFARS NIST 800-171 and CMMC controls, where applicable. Format: MS Word document (.docx). Length: 39 pages.